US20190205575A1 - Smart card system comprising a card and a carrier - Google Patents
Smart card system comprising a card and a carrier Download PDFInfo
- Publication number
- US20190205575A1 US20190205575A1 US16/292,134 US201916292134A US2019205575A1 US 20190205575 A1 US20190205575 A1 US 20190205575A1 US 201916292134 A US201916292134 A US 201916292134A US 2019205575 A1 US2019205575 A1 US 2019205575A1
- Authority
- US
- United States
- Prior art keywords
- smart card
- carrier
- card
- interface
- biometric
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10158—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves methods and means used by the interrogation device for reliably powering the wireless record carriers using an electromagnetic interrogation field
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0716—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising a sensor or an interface to a sensor
- G06K19/0718—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising a sensor or an interface to a sensor the sensor being of the biometric kind, e.g. fingerprint sensors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
- G06K19/07701—Constructional details, e.g. mounting of circuits in the carrier the record carrier comprising an interface suitable for human interaction
- G06K19/07703—Constructional details, e.g. mounting of circuits in the carrier the record carrier comprising an interface suitable for human interaction the interface being visual
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
- G06K19/07701—Constructional details, e.g. mounting of circuits in the carrier the record carrier comprising an interface suitable for human interaction
- G06K19/07703—Constructional details, e.g. mounting of circuits in the carrier the record carrier comprising an interface suitable for human interaction the interface being visual
- G06K19/07705—Constructional details, e.g. mounting of circuits in the carrier the record carrier comprising an interface suitable for human interaction the interface being visual the visual interface being a single light or small number of lights capable of being switched on or off, e.g. a series of LEDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
- G06K19/07749—Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/322—Aspects of commerce using mobile devices [M-devices]
- G06Q20/3226—Use of secure elements separate from M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/325—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices using wireless networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/352—Contactless payments by cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/353—Payments by cards read by M-devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/356—Aspects of software for card payments
- G06Q20/3567—Software being in the reader
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/0873—Details of the card reader
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4012—Verifying personal identification numbers [PIN]
Definitions
- the present disclosure relates generally to smart cards, and more particularly, some embodiments relate to smart card systems comprising a card and a carrier.
- Smart cards can provide identification, authentication, data storage, and application processing, as well as serving as credit or ATM debit cards, phone or fuel cards, and high-security access-control cards for granting access to a building or computer.
- Smart cards can authenticate the identity of a user by employing a public key infrastructure (PKI). This authentication process may be conducted in a variety of ways, including through the use of a pin, password, or biometric authentication, or a combination of methods for added layers of security.
- PKI public key infrastructure
- Smart card readers come in many different form factors and operate in many different ways. Some readers require insertion of the entire card into the reader. Others may allow a portion of the card to remain accessible by the user. These differences between smart card readers make it difficult to include additional layers of security, such as biometric authentication, because such features may be physically incompatible with the operation of the smart card reader.
- NFC near field communications
- RFID RFID
- These contactless smart cards are built with compatible antennas inside the card.
- adding contactless capability increases the complexity of the smart card design and manufacture.
- such transactions may only be conducted using smart card readers designed for such transactions.
- to provide a smart card with the capability to communicate over different wireless standards, such as Wi-Fi or Bluetooth would require a more complex and powerful transceiver within the card. This adds to the complexity of the card design through the need to include a greater number of computing components within the form factor of the card, including an on-board power source.
- a smart card carrier comprising a housing having an opening configured to accept a smart card; a smart card interface configured to be coupled to the smart card when the smart card is accepted into the opening and configured to provide a data communication link with one or more processors in the smart card; a wireless transceiver configured to engage in wireless data communication with a transaction terminal when the smart card interface is coupled to the smart card; and a power source configured to supply power to the wireless transceiver and the smart card interface.
- a method for facilitating wireless transactions with a smart card through a smart card carrier comprising receiving from a transaction terminal a request related to a transaction involving the smart card; engaging in data communication related to the request with one or more processors in the smart card through a smart card interface coupled to an interface on the smart card; and transmitting a response to the request to the transaction terminal through the wireless transceiver.
- FIG. 1 is an example diagram of a smart card carrier and a smart card in accordance with an embodiment of the technology disclosed herein.
- FIG. 2 is an example diagram of a smart card carrier and a smart card with an additional security layer in accordance with an embodiment of the technology disclosed herein.
- FIG. 3 is an example diagram of a smart card carrier and a smart card without on-board processing capabilities in accordance with an embodiment of the technology disclosed herein.
- FIG. 4 is an example diagram of a smart card carrier having an on-board processor and a smart card in accordance with an embodiment of the technology disclosed herein.
- FIG. 5 is an example diagram of the mating of a smart card carrier and a smart card in accordance with an embodiment of the technology disclosed herein.
- FIG. 6 is an example diagram illustrating a smart card engaged with a smart card carrier in accordance with an embodiment of the technology disclosed herein.
- FIG. 7 is an example diagram of the mating of a smart card carrier and a smart card in accordance with another embodiment of the technology disclosed herein.
- FIG. 8 is an example diagram illustrating a smart card engaged with a smart card carrier in accordance with another embodiment of the technology disclosed herein.
- FIG. 9 is an example transaction system in accordance with an embodiment of the technology disclosed herein.
- FIG. 10 is an example wireless transaction system in accordance with an embodiment of the technology disclosed herein.
- FIG. 11 is another example wireless transaction system in accordance with an embodiment of the technology disclosed herein.
- FIG. 12 is an example flow diagram of a method of conducting a wireless transaction using a smart card carrier in accordance with an embodiment of the technology disclosed herein.
- FIG. 13 is an example flow diagram of a method of conducting a wireless transaction using a biometric authentication smart card and a smart card carrier in accordance with an embodiment of the technology disclosed herein.
- Embodiments of the technology disclosed herein are directed toward a system for and method of conducting wireless transactions using a smart card. More particularly, the various embodiments of the technology disclosed herein relate to providing wireless transaction capability to a contact smart card.
- Smart cards come in a variety of types, examples of which are shown and described in FIGS. 1-4 .
- the earliest version of a card with integrated circuits embedded therein included memory circuitry to allow for storage of information.
- Transaction applications would run on the terminals with which the cards were used, obtaining the information required for the transactions stored in the memory component of the card.
- microprocessors were added to create the basic “smart card” concept known today.
- the addition of the microprocessor allowed for the applications for transactions to be stored and run on the cards themselves.
- the addition of on-board processors of course, increased the complexity of the card. Accordingly, card designers must make choices regarding the level of functionality necessary for the card's purpose and determine how complex a design to create.
- One aspect of the technology disclosed herein provides additional functionality to any type of smart card architecture.
- FIG. 1 is an example block diagram of a smart card system 100 comprising a card 110 and a carrier 140 in accordance with the technology herein disclosed.
- the card 110 shown in FIG. 1 is basic smart card design, as described above. In various embodiments, card 110 has substantially the same shape and form factor as conventional credit and debit cards.
- Card 110 comprises a processing module 112 and a memory 113 .
- Processing module 112 may be a microprocessor, microcontroller, application-specific integrated circuit (ASIC), field-programmable gate array (FPGA), or any combination of components configured to perform and/or control the functions of card 110 .
- Memory 113 may be a read-only memory (ROM) such as EPROM or EEPROM, flash, or any other storage component capable of storing executory programs and information for use by the processing module 112 .
- ROM read-only memory
- card 110 may comprise a terminal interface 114 .
- Terminal interface 114 is communicatively coupled to processing module 112 .
- Terminal interface 114 may be configured for use when card 110 is being used by itself (i.e., without the carrier 140 ), for example, when card 110 is engaged directly in a sales transaction via a point-of-sale (POS) terminal at a retail store or a kiosk or an access control transaction at a computer or building.
- terminal interface 114 may include one or more conductive pads or pins that make electrical contact with corresponding conductive pads or pins provided in the terminal or smart card reader. Data communication between card 110 and the terminal occurs through terminal interface 114 .
- some of the conductive pads of terminal interface 114 provide paths by which electrical power flows from the terminal to processing module 112 and memory 113 via power line 119 . This eliminates the need for card 110 to have its own on-board power source, simplifying design and manufacture.
- card 110 may also include a carrier interface 116 .
- Carrier interface 116 is communicatively coupled to processing module 112 .
- Carrier interface 116 may be configured for use with carrier 140 .
- carrier interface 116 may include one or more conductive pads or pins that make electrical contact with a corresponding card interface 144 in smart card carrier 140 .
- some of the conductive pads or pins of carrier interface 116 provide paths by which electrical power flows from power source 146 of carrier 140 to processing module 112 and memory 113 via power line 119 , similar to the power management described above between card 110 and a terminal while conducting a transaction.
- terminal interface 114 and carrier interface 116 may be combined into a single interface.
- carrier 140 comprises a housing, a wireless transceiver module 142 , a card interface 144 , a power source 146 , and an user interface 148 .
- the housing of carrier may 140 may be constructed of one of more of plastic, metal, ceramic, glass, or other form-sustaining material.
- the housing may comprise multiple panels made of one or more form-sustaining materials, or the housing may be constructed through injection molding techniques.
- the housing of carrier 140 may comprise multiple layers.
- the components may be affixed to the housing in various ways.
- the components may be affixed to the housing by physical fasteners, such as screws or rivets.
- the components may be affixed to the housing through crimping, welding, soldering, taping, gluing or cementing.
- the housing may include brackets and the components may be designed to be held in place by the brackets.
- a printed circuit board (PCB) including at least some of the components may be affixed to the housing.
- PCB printed circuit board
- the components of carrier 140 are powered by power source 146 via power line 149 .
- power source 149 may be a removable battery, a rechargeable battery, a solar cell, an inductive loop, or other power storage and/or generating components.
- the battery may be both a removable battery and a rechargeable battery, and the battery may be recharged by removing the battery from the carrier and using an external charging station to recharge.
- recharging of a rechargeable battery may be accomplished through an input on carrier 140 , such as a micro USB port, or through induction technologies.
- carrier 140 may include an input for receiving power from an external source, such as from an external power supply.
- wireless transceiver module 142 may be configured to transmit and receive communications over several different wireless communications standards and/or technologies. Such standards/technologies may include Wi-Fi, Bluetooth, near field communications (NFC), RFID, WiMAX, LTE, or other standards. In various embodiments, wireless transceiver module 142 may be configured to transmit and receive over one or more wireless communications standards/technologies. Wireless transceiver module 142 may comprise multiple transmitter modules and receiver modules, and necessary modulation and demodulation modules as required to conduct wireless communications.
- Carrier 140 also includes an antenna 143 for conducting wireless communications.
- Antenna 143 is communicatively coupled to wireless transceiver module 142 .
- antenna 143 may a multi-purpose antenna, designed to transmit and receive over various communication standards, or antenna 143 may comprise more than one antenna for different communication standards.
- antenna 143 may be a directional antenna for increased security of wireless transmission.
- User interface 148 provides information to the user regarding the status of the transaction occurring.
- user interface 148 may comprise one or more indicator lights configured to convey status information to the user in a variety of ways.
- the indicator lights may be LEDs or any other visual components.
- only one indicator light may be provided that is configured to show a different color based on whether card 110 is probably connected with carrier 140 (red), whether the system is operational (green), or whether a transaction is processing (yellow).
- the recitation of green, red, and yellow as the colors of the indicators merely used as an example; any combination of colors is in accordance with the technology herein disclosed.
- there may be an indicator light for each of a number of different labeled indicators such as “ON,” “TRANSMITTING,” “ERROR,” or other type of information that would be pertinent to the user while conducting a transaction.
- user interface 148 may be a visual display, such as an LCD display or other visual/textual display. In these embodiments, user interface 148 would indicate in a visual manner to the user the status of the system and any transactions being conducted.
- the visual display may be a touch-screen.
- user interface 148 may also include a power-on capability. This capability may be a switch, button, or other method of powering on and off carrier 140 . In various embodiments, this capability may be separate from user interface 148 .
- user interface 148 may a combination of the different interfaces discussed above.
- user interface 148 may include a row of indicator lights and an LCD display, providing both visual indications from the indicator lights as well as textual explanations of the current status of the system.
- carrier 140 may also include a processing module (not shown) and memory (not shown) for performing operations related to user interface 148 .
- user interface 148 may be embedded on card 110 . In such embodiments, the user interface may operate in the same manner as discussed above with regards to user interface 148 on carrier 140 .
- both carrier 148 and card 110 may include a user interface.
- FIG. 1 represents only one example smart card. Smart cards compatible with the technology herein disclosed may have additional components, such as additional layers of transactional security. These other types of smart cards may include security features, such as personal identification numbers (PINs), passwords, or biometric security features that must be authenticated prior to a transaction being completed.
- FIG. 2 is another example of smart card system 200 with a card 210 having an additional security layer of a biometric authentication unit included. Although FIG. 2 describes the technology herein disclosed using a biometric authentication unit, the technology is similar to and compatible with smart cards using different security techniques and should not be interpreted to limit the technology herein disclosed to biometric authorization systems.
- Card 210 includes similar components of card 110 , including a processing module 112 , a memory 113 , a carrier interface 116 , a terminal interface 114 , and power line 119 . These components operate in a similar fashion to the discussion above with respect to FIG. 1 regarding the components of card 110 .
- card 210 includes a biometric authentication module 220 .
- biometric authentication module 220 includes an authentication memory 224 , a controller module 226 , and a biometric sensor 222 .
- Authentication memory 224 may be configured to store a image or template of the biometric characteristics of an authorized user for authentication purposes.
- Authentication memory 224 may be a read-only memory (ROM) such as EPROM or EEPROM, flash, or any other storage component capable of storing biometric data of one or more authorized users at the time card 210 is issued.
- ROM read-only memory
- authentication memory 224 may be capable of both read and write commands to allow for the addition of other later authorized users through a reassignment process after issuance of the card.
- authentication memory 224 and memory 113 may be the same component.
- Controller 226 is a processing module configured to execute authentication application programming stored in memory 224 .
- controller 226 accepts a biometric input from sensor 222 and creates a biometric image template for authentication, as described in more detail below.
- controller 226 can receive an already created biometric image template from sensor 222 already formatted for authentication purposes.
- controller 226 performs the biometric authentication process by comparing the biometric image template with the stored biometric data from authentication memory 224 .
- Controller 226 is coupled to processing module 112 through connection 229 . When a transaction is occurring, processing module 112 sends an authentication request to controller 226 .
- Controller 222 then compares the biometric image template against the biometric data (e.g., a biometric template or image) stored in authentication memory 224 .
- controller 226 determines if the biometric image template is within a predetermined threshold value of the stored biometric data. Such a threshold value can be stored in authentication memory 224 . If there is a match, controller 226 sends an indication to processing module 112 that the user is authenticated and the transaction may proceed. If there is not a match, controller 226 sends an indication to processing module 112 that the user is not authorized to conduct the transaction and to terminate the transaction session.
- controller 226 may be a separate hardware processing module from processing module 112 .
- controller 226 may be implemented in software, such as a virtual machine (VM) executed using processing module 112 .
- VM virtual machine
- additional security features may be implemented within processing module 112 , such as partitioning between the VM and the card operating system to ensure that no unauthorized access to the controller module occurs.
- the authentication application programming executed by controller 226 may be stored in memory 113 and accessible by controller 226 through processing module 112 .
- controller 226 may have direct access to memory 113 .
- biometric sensor 222 is a biometric reader or scanner capable of reading or scanning one or more biometrics of a user. Biometrics are human characteristics unique to an individual. In various embodiments, biometric sensor 222 may be configured as a fingerprint scanner, an iris scanner, a voice-identification unit, or other physiological characteristic of an individual. As discussed above, the biometric input from sensor 222 can be sent directly to controller 226 in order to allow controller 226 to create the biometric image template. In various embodiments, sensor 222 may be capable of turning the biometric input from the user into the biometric image template necessary for comparison.
- card 210 may have only a single component for processing both the transaction and authentication functions of card 210 .
- this single processing component may be processing module 112 , and processing module 112 may be configured to execute both transaction applications and the functions of controller 226 described above. This eliminates the need for multiple processing units on the card and lowers the complexity of the design.
- Carrier 340 is similar to carrier 140 shown in FIGS. 1 and 2 , but also includes an on-board processing module 350 and memory 354 .
- processing module 350 may perform all the functions of carrier 350 , including controlling wireless transceiver 142 and user interface 148 , like the processing module and memory described (but not shown) in FIG. 1 .
- processing module 350 may be a separate processing component for performing the transaction application(s) of card 310 .
- the other components depicted in FIG. 3 may operate in various embodiments in the same manner as discussed with respect to corresponding components in FIGS. 1 and 2 .
- carrier 340 receives the biometric input from sensor 222 and the biometric template stored in authentication memory 224 via carrier interface 116 .
- controller 226 may be the same as processing module 112 , only without the functionality to perform the authentication process. Controller 226 sends the biometric data from sensor 222 and authentication memory 224 to carrier interface 116 over connection 329 .
- Processing module 350 of carrier 340 receives the biometric data from via card interface 146 over connections 352 and performs the authentication function as described with respect to FIG. 2 .
- memory 354 may store the authentication application, transaction application(s), or both.
- controller 226 may send the biometric input from sensor 222 to carrier 140 , and processing module 350 can access memory 354 for the necessary authentication application and perform the authentication process.
- the authentication program may be stored in authentication memory 224 , and the program may also be sent to carrier 340 via carrier interface 116 .
- memory 354 can store the biometric data discussed above with regards to authentication memory 224 for authentication purposes.
- carrier 340 has been described as performing the authentication functions of card 310 , this should not be read to limit the functionality of carrier 340 .
- Carrier 340 may be designed to perform any transaction or function associated with card 310 , or any other smart card employed. In various embodiments, carrier 340 may perform any function stored on or designed to be performed by card 310 , or other smart card employed in the system. In various embodiments, memory 354 may store all the applications necessary to conduct any financial transaction or access authorization to a facility or computer system.
- FIGS. 1-3 describe the processing function as being performed by either the carrier or the smart card
- various embodiments include both the carrier and the smart card to have processing capabilities.
- An example of a system employing carrier 340 and card 210 is shown in FIG. 4 .
- Both carrier 340 and card 210 include processing modules (modules 350 and 112 , respectively) that allow both objects to process information.
- carrier 340 may send a command to card 210 via card interface 146 to forward all required information to carrier 340 for processing.
- card 210 may perform all the processing, as discussed with respect to FIG. 2 , and processing module 350 may only process information related to functionality of the carrier, such as the display of user interface 148 .
- card 210 and carrier 340 may share processing functions, such as authentication occurring on card 210 but completion of the transaction occurring on carrier 340 .
- authentication module 220 may communicate directly with carrier 340 .
- Carrier 340 may send a request directly to authentication module 220 through carrier interface 116 over data line 228 .
- carrier 340 may send a request to processing module 112 , requesting information from authentication module 220 .
- Authentication module 220 can then send the requested data directly to carrier interface 116 over data line 228 , instead of sending the data to processing module 112 over data line 229 . In this way, carrier 340 may communicate with authentication module 220 without needing to pass all messages through processing module 112 .
- carrier 340 may be restricted to use with only certain smart cards.
- memory 354 may store an authorized list of the smart cards with which carrier 340 may operate.
- the authorized list may identify the authorized smart cards based on a serial number or other identifying information of the cards themselves.
- Memory 354 may store a set of authentication data, such as a copy of the biometric data stored in authentication memory 224 , a passcode, or PIN, for each individual authorized to use carrier 340 .
- carrier 340 may refuse to allow wireless communication until the person is authorized to use carrier 340 . In this way, the carrier could be personalized for use only be one individual, in the event that someone tries to use carrier 340 to conduct wireless transactions.
- FIGS. 5 and 6 are high-level diagrams showing how the cards and carriers such as the ones shown in FIGS. 1-4 interact in a system in accordance with the technology.
- card 210 A is shown separate from carrier 140 A.
- the housing 300 of carrier 140 A has opening 310 configured to accommodate or accept card 210 A.
- the top face of carrier 140 A is shorter than the length of card 210 A to enable access to biometric sensor 222 .
- FIG. 6 shows an example of how card 210 A fits within carrier 140 A through opening 310 .
- the biometric sensor 222 on card 210 A remains accessible by a user after card 210 A is inserted into carrier 140 A.
- FIGS. 5 and 6 show one configuration of carrier 140 A, other configurations are contemplated by the technology herein disclosed, and FIGS. 5 and 6 should not be interpreted to limit the scope of the present disclosure in any way.
- the smart card carrier may include a cut-out providing access to a biometric sensor provided on a smart card and facilitate the use of the biometric security layer.
- FIGS. 7 and 8 illustrate an example of this configuration.
- FIGS. 5-8 discuss the embodiments in terms of a “top” face and a “bottom” face, the use of such language are merely descriptive and do not imply or require that the disclosed technology be implemented or used in a particular spatial orientation.
- FIGS. 9-11 illustrate example environments and transactions that may be conducted in accordance with the technology herein disclosed.
- FIGS. 9-11 are shown using card 210 described above, the system architecture is similar to and functions in a similar manner utilizing smart cards in accordance with card 110 , card 310 , or any other smart card.
- the use of card 210 is for example purposes only and should not be interpreted to limit the scope of the technology herein disclosed.
- FIG. 9 illustrates transaction system 900 comprising a smart card and a POS terminal 910 .
- the smart card shown in FIG. 9 is card 210 illustrated in FIG. 2 , but the smart card can be card 110 , card 310 , or any other smart card.
- card 210 is used without carrier 140 or carrier 340 .
- Terminal 910 includes an interface 914 , which may be any type of smart card reader known in the art.
- terminal 910 may also include a terminal processing module 912 and a terminal memory 913 .
- Card 210 interacts with terminal 910 through a physical connection of terminal interface 114 and interface 914 . This connection is made by inserting card 210 into a smart card reader of terminal 910 .
- terminal 910 supplies power to card 210 through this physical connection, in a similar fashion as described above in regards to the description of terminal interface 114 in FIG. 1 .
- Terminal 910 is connected to a transaction processing center (TPC) 920 .
- TPC 920 may be operated by a user's bank, a smart card issuer, a merchant, or some other entity, and may include a server 922 and a user database 924 for storing, processing, and authorizing transactions between the smart card user and the merchant.
- Terminal 910 and TPC 920 may be connected over a network 302 .
- TPC 920 may be geographically displaced and network 902 may be an Internet connection.
- terminal 910 and TPC 920 may be co-located and connected through a local area network (LAN) or intranet connection.
- LAN local area network
- the method of transaction between terminal 910 and TPC 920 is not required to understand the technology herein and outside the scope of this disclosure.
- terminal 910 sends a request to conduct a transaction via interface 914 to card 210 via terminal interface 114 .
- Processing module 112 receives the request and sends an activation message to controller 226 to activate biometric authentication module 220 .
- card 210 receives power through terminal interface 114 from terminal 910 , which powers the components of card 210 via power line 119 .
- controller 226 receives biometric input from sensor 222 .
- the biometric input received is contingent on the type of sensor employed, such as a fingerprint scanner or an iris scanner.
- controller 226 access the stored biometric data in authentication memory 224 and determines whether there is a match.
- controller 226 sends a message to processing module 112 via connection 229 that the transaction is authorized to be conducted.
- processing module 112 may execute application instructions stored in memory 113 and transmit to terminal 910 the information (e.g., a password or certificate) necessary to complete the transaction via terminal interface 114 .
- the password or certificate is encrypted before it is transmitted.
- controller 226 determines that there is not a match between the biometric input from sensor 222 and the biometric data stored in memory 224 , controller 226 sends an indication or notification to processing module 112 over connection 229 that the user is not authorized to conduct the transaction.
- processing module 112 may simply not respond to the request from terminal 910 .
- processing module 112 may execute an application instruction stored in memory 113 regarding unauthorized access attempts and send a notification to terminal 910 .
- processing module 112 upon receiving one or more indications of unauthorized use from controller 226 , deactivates the card 210 to prevent a further attempt.
- Terminal 1010 is similar to terminal 910 shown on FIG. 9 .
- terminal 1010 may include a terminal transceiver 1014 , communicatively coupled to an antenna 1015 , to enable wireless transactions to occur.
- terminal 1010 may also include an interface, like the interface 914 in terminal 910 of FIG. 9 , but such an interface is not required in terminal 1010 .
- Card 210 is inserted into carrier 140 in a manner similar to that shown in FIGS. 5-8 . Unlike the transaction described in FIG.
- card 210 does not interact directly with terminal 1010 but instead communicates with terminal 1010 through wireless transceiver module 142 of carrier 140 .
- Terminal 1010 sends a request to conduct a transaction via terminal transceiver 1014 to wireless transceiver module 142 of carrier 140 .
- the communication standard used depends on the type of wireless transceiver employed within terminal 1010 and carrier 140 .
- wireless transceiver 142 may be compatible with more than one communication standard/technology, such as Bluetooth, NFC, and Wi-Fi, in order to provide greater operability of carrier 140 with a variety of systems.
- Wireless transceiver module 142 then transfers the request message to card interface 146 , which is communicatively coupled to carrier interface 116 of card 210 . In this way, the message from terminal 1010 is communicated to processing module 112 of card 210 without card 210 physically in contact with terminal 1010 . Processing module 112 operates in the same manner as if it was in physical contact with terminal 1010 , similar to the operation discussed above in regards to FIG. 9 .
- carrier 140 supplies power from power source 146 to card 210 through card interface 146 .
- no on-board power source is required on card 210 to power authentication module 220 , processing module 112 , or any other components that might be present in card 210 .
- the enhanced capability of conducting wireless transactions may be provided to a simple contact smart card.
- Wireless transceivers capable of Bluetooth, Wi-Fi, or other higher-protocol communication standards or technologies require more power than could feasibly be included in the form factor of a credit card in a cost effective manner.
- an external contactless transaction system in accordance with the technology disclosed herein, like carrier 140 , allows for smart cards with additional layers of security to be created and compatible with many different systems.
- a smart card with a biometric sensor such as card 210 of FIG. 2 would not be able to function easily with a transaction system, like an ATM machine, that requires the entire card to be inserted into the machine and to remain there during the entirety of the transaction.
- This feature is for security purposes, to ensure that someone cannot come and easily swipe a person's ATM card.
- Using a smart card carrier such as carrier 140 allows for ease of use of the biometric authentication feature.
- FIG. 11 illustrates an example transaction system 1100 including a mobile terminal 1110 .
- mobile terminal 1110 is different from terminal 1010 , the transaction would occur in a way similar to the transaction described in FIG. 10 .
- FIG. 12 details the steps of the method from the perspective of the smart card carrier.
- the smart card carrier receives a transaction request wirelessly sent from a POS or mobile terminal.
- the transaction request could be one of the following non-limiting examples: credit or debit charges, computer access, or facility access.
- a wireless transceiver in the smart card carrier receives the request from the POS or mobile terminal.
- the request could be communicated using a variety of different wireless communication standards or technologies, including Bluetooth, Wi-Fi, NFC, RFID, or others.
- the smart card carrier engages in data communication with one or more processors on a smart card.
- the data communication involves request by the smart card carrier for information from the smart card.
- the data communication may be a request for the smart card to transmit stored biometric or other authentication-related data from a memory on the smart card to the carrier.
- the data communication between the smart card carrier and the smart card may be a transfer of the transaction request as received by the smart card carrier to the smart card for processing.
- the data communication could be any other type of communication related to the transaction request, such as communications about where the authentication procedure occurs or the an indication of the results of authentication.
- the smart card interface is communicatively coupled to the contacts of the contact smart card.
- the method transitions at point A to the example processing of the request by the smart card, illustrated in FIG. 13 .
- FIG. 13 Although depicted as processing by a biometric secured smart card, the flowchart is only an example of one embodiment of the method. For contact smart cards without additional security features, the method would exclude the authentication process and simply send a response to a transaction request.
- the smart card receives the data communication related to the transaction request of a terminal from the smart card carrier through the smart card's contact points.
- the request appears as an ordinary request through the smart card's contact points because it is engaged with the smart card carrier in the same fashion as if the smart card was engaged with the terminal directly, e.g., via terminal interface 114 shown in FIGS. 1 and 2 .
- the request from the smart card carrier may be a data communication related to the transaction request, but not the transaction request as originally received, as discussed above with respect to step 620 of FIG. 12 .
- the request transferred to the smart card may be any type of data communication necessary to complete the transaction according to the type and location of the processing functions required. The request is sent to one or more processing modules of the smart card.
- the authentication process is activated at step 720 .
- the authentication process is a biometric security check.
- other types of layered security may be used, such as a PIN or a password, in lieu of or in addition to the biometric authentication.
- the authentication process occurs at the smart card carrier, one or more of the steps 720 - 770 may occur at the smart card carrier instead of on the biometric smart card.
- the card receives the user's biometric signature.
- the user's biometric signature may be a fingerprint, a voice sample, an iris scan, or other biometric characteristic utilized to authenticate the user's identity.
- the user may enter a PIN or password associated with the user at step 730 .
- the user's biometric signature is compared with a biometric template stored on the smart card.
- This biometric template may be stored in an authentication memory separate from any other memory of the smart card, or it could be stored in the same memory with other applications and data used by the smart card.
- the template stored in memory may be a copy of the user's PIN or password for comparison.
- the smart card decides whether the biometric signature is authentic at step 750 .
- the particular level of similarity or the metrics used to determine if a biometric signature is the same or similar enough to the template to qualify as authentic may vary.
- a notification of a successful authentication is sent to the card's contact points at step 762 .
- This notification could be a simple notice that the user is the authentic user, the relevant information requested by the terminal, or a combination of both.
- the notification could also include additional indications, such as the level of accuracy of the authentication process or requests from the card for additional information from the terminal.
- the content of the notification may vary depending on the complexity built into the smart card applications or applications.
- a notification of a failed authentication is sent to the card's contact points at step 764 . Similar to the notification for a success, the notification of failure may include additional information related to the failure, such as request for the terminal to contact the smart card issuer or a request to restart the transaction process. In various embodiments, if the authentication is unsuccessful the smart card could send no message to the contact points and instead merely ignore the transaction request.
- the smart card can deactivate the authentication module.
- the authentication process may need to only be completed once during a transaction session.
- the result of a successful authentication could be stored in a memory of the smart card for the duration of a transaction session.
- the authentication process may be repeated for each request received by the smart card.
- a response is received from the smart card via the card interface of the smart card carrier at step 630 of FIG. 12 .
- the card interface transfers the response to the wireless transceiver for transmission to the requesting terminal. This is done in the same, but reversed, manner as step 620 .
- the wireless transceiver transmits the response to terminal. If no further action is required the transaction is completed. If more information is needed or additional actions are to be taken, the method may repeat itself.
- cards 110 , 210 , and/or 310 may include a GPS antenna, beacon, or other indicator component that allows for determining the location of the card. This additional functionality allows for an added layer of transaction security by allowing authentication to occur based on location, in addition to other authentication methods such as biometrics or passcodes (PINs), for example.
- carriers 140 or 340 may include such a GPS antenna, beacon, or other indicator component. When a transaction is occurring in an unfamiliar location based on the user's identity, carriers 140 or 340 may request additional verification of the user, either through performing on-board biometric authentication as described in FIG. 2 again, reentering the passcode, password, or other identifying code of the user, or other authentication method.
- location-based authentication may also provide additional security when the smart card is being used as a method of restricting access to certain areas within a facility.
- a particular smart card may be issued to a certain individual, who is authorized to enter certain areas of a facility, base, headquarters, or other location.
- Carriers 140 or 340 may be used with the issued card to allow for wireless communication with the internal network of the facility controlling access to different areas.
- the network administrator may send out a request for reauthentication to ensure that the person has access to the area in which they are located. The holder would then conduct the authentication procedure as described above with respect to FIGS. 2 and 12-13 to verify that the holder is the person with proper access to that area.
- the network may be programmed to send out the periodic request.
- the holder may be required to verify his or her identity each time access is requested to an area within the facility. This authentication process is also applicable to access to non-physical areas, such as access to computer networks.
- module might describe a given unit of functionality that can be performed in accordance with one or more embodiments of the technology disclosed herein.
- a module might be implemented utilizing any form of hardware, software, or a combination thereof.
- processors, controllers, ASICs, PLAs, PALs, CPLDs, FPGAs, logical components, software routines or other mechanisms might be implemented to make up a module.
- the various modules described herein might be implemented as discrete modules or the functions and features described can be shared in part or in total among one or more modules.
- module does not imply that the components or functionality described or claimed as part of the module are all configured in a common package. Indeed, any or all of the various components of a module, whether control logic or other components, can be combined in a single package or separately maintained and can further be distributed in multiple groupings or packages or across multiple locations.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Electromagnetism (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Automation & Control Theory (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Credit Cards Or The Like (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
A system and method for facilitating wireless transactions using a smart card, the system comprising a housing having an opening configured to accept a smart card; a smart card interface configured to be coupled to the smart card when the smart card is accepted into the opening and configured to provide a data communication link with one or more processers in the smart card; a wireless transceiver configured to engage in wireless data communication with a transaction terminal when the smart card interface is coupled to the smart card; and a power source configured to supply power to the wireless transceiver and the smart card interface.
Description
- The present application is related to concurrently filed U.S. patent application Ser. No. 14/596,508 entitled “System and Method for Requesting Reconciliation of Electronic Transactions for Enhanced Security”; U.S. patent application Ser. No. 14/596,472, entitled “System and Method for Comparing Electronic Transaction Records for Enhanced Security”; and U.S. patent application Ser. No. entitled 14/596,420, “System and Method for Reconciling Electronic Transaction Records for Enhanced Security,” which are all incorporated herein by reference in their entirety.
- The present disclosure relates generally to smart cards, and more particularly, some embodiments relate to smart card systems comprising a card and a carrier.
- Electronic transactions, such as credit card transactions, can be conducted using smart cards. A smart card is a card with embedded integrated circuits that include a processor and a memory. Smart cards can provide identification, authentication, data storage, and application processing, as well as serving as credit or ATM debit cards, phone or fuel cards, and high-security access-control cards for granting access to a building or computer. Smart cards can authenticate the identity of a user by employing a public key infrastructure (PKI). This authentication process may be conducted in a variety of ways, including through the use of a pin, password, or biometric authentication, or a combination of methods for added layers of security.
- Smart card readers come in many different form factors and operate in many different ways. Some readers require insertion of the entire card into the reader. Others may allow a portion of the card to remain accessible by the user. These differences between smart card readers make it difficult to include additional layers of security, such as biometric authentication, because such features may be physically incompatible with the operation of the smart card reader.
- Contactless transactions allow for the completion of transactions using smart cards wirelessly using near field communications (NFC) and RFID technologies. These contactless smart cards are built with compatible antennas inside the card. However, adding contactless capability increases the complexity of the smart card design and manufacture. In addition, such transactions may only be conducted using smart card readers designed for such transactions. Moreover, to provide a smart card with the capability to communicate over different wireless standards, such as Wi-Fi or Bluetooth, would require a more complex and powerful transceiver within the card. This adds to the complexity of the card design through the need to include a greater number of computing components within the form factor of the card, including an on-board power source.
- According to various embodiments of the disclosed technology, a smart card carrier is provided comprising a housing having an opening configured to accept a smart card; a smart card interface configured to be coupled to the smart card when the smart card is accepted into the opening and configured to provide a data communication link with one or more processors in the smart card; a wireless transceiver configured to engage in wireless data communication with a transaction terminal when the smart card interface is coupled to the smart card; and a power source configured to supply power to the wireless transceiver and the smart card interface.
- According to various embodiments of the disclosed technology, a method for facilitating wireless transactions with a smart card through a smart card carrier is provided, comprising receiving from a transaction terminal a request related to a transaction involving the smart card; engaging in data communication related to the request with one or more processors in the smart card through a smart card interface coupled to an interface on the smart card; and transmitting a response to the request to the transaction terminal through the wireless transceiver.
- Other features and aspects of the disclosed technology will become apparent from the following detailed description, taken in conjunction with the accompanying drawings, which illustrate, by way of example, the features in accordance with embodiments of the disclosed technology. The summary is not intended to limit the scope of any inventions described herein, which are defined solely by the claims attached hereto.
- The technology disclosed herein, in accordance with one or more various embodiments, is described in detail with reference to the following figures. The drawings are provided for purposes of illustration only and merely depict typical or example embodiments of the disclosed technology. These drawings are provided to facilitate the reader's understanding of the disclosed technology and shall not be considered limiting of the breadth, scope, or applicability thereof. It should be noted that for clarity and ease of illustration these drawings are not necessarily made to scale.
-
FIG. 1 is an example diagram of a smart card carrier and a smart card in accordance with an embodiment of the technology disclosed herein. -
FIG. 2 is an example diagram of a smart card carrier and a smart card with an additional security layer in accordance with an embodiment of the technology disclosed herein. -
FIG. 3 is an example diagram of a smart card carrier and a smart card without on-board processing capabilities in accordance with an embodiment of the technology disclosed herein. -
FIG. 4 is an example diagram of a smart card carrier having an on-board processor and a smart card in accordance with an embodiment of the technology disclosed herein. -
FIG. 5 is an example diagram of the mating of a smart card carrier and a smart card in accordance with an embodiment of the technology disclosed herein. -
FIG. 6 is an example diagram illustrating a smart card engaged with a smart card carrier in accordance with an embodiment of the technology disclosed herein. -
FIG. 7 is an example diagram of the mating of a smart card carrier and a smart card in accordance with another embodiment of the technology disclosed herein. -
FIG. 8 is an example diagram illustrating a smart card engaged with a smart card carrier in accordance with another embodiment of the technology disclosed herein. -
FIG. 9 is an example transaction system in accordance with an embodiment of the technology disclosed herein. -
FIG. 10 is an example wireless transaction system in accordance with an embodiment of the technology disclosed herein. -
FIG. 11 is another example wireless transaction system in accordance with an embodiment of the technology disclosed herein. -
FIG. 12 is an example flow diagram of a method of conducting a wireless transaction using a smart card carrier in accordance with an embodiment of the technology disclosed herein. -
FIG. 13 is an example flow diagram of a method of conducting a wireless transaction using a biometric authentication smart card and a smart card carrier in accordance with an embodiment of the technology disclosed herein. - The figures are not intended to be exhaustive or to limit the invention to the precise form disclosed. It should be understood that the invention can be practiced with modification and alteration, and that the disclosed technology be limited only by the claims and the equivalents thereof.
- Embodiments of the technology disclosed herein are directed toward a system for and method of conducting wireless transactions using a smart card. More particularly, the various embodiments of the technology disclosed herein relate to providing wireless transaction capability to a contact smart card.
- Before describing the technology disclosed in detail, it is useful to describe example smart cards with which the technology can be implemented. Smart cards come in a variety of types, examples of which are shown and described in
FIGS. 1-4 . The earliest version of a card with integrated circuits embedded therein included memory circuitry to allow for storage of information. Transaction applications would run on the terminals with which the cards were used, obtaining the information required for the transactions stored in the memory component of the card. Overtime, microprocessors were added to create the basic “smart card” concept known today. The addition of the microprocessor allowed for the applications for transactions to be stored and run on the cards themselves. The addition of on-board processors, of course, increased the complexity of the card. Accordingly, card designers must make choices regarding the level of functionality necessary for the card's purpose and determine how complex a design to create. One aspect of the technology disclosed herein provides additional functionality to any type of smart card architecture. -
FIG. 1 is an example block diagram of asmart card system 100 comprising acard 110 and acarrier 140 in accordance with the technology herein disclosed. Thecard 110 shown inFIG. 1 is basic smart card design, as described above. In various embodiments,card 110 has substantially the same shape and form factor as conventional credit and debit cards.Card 110 comprises aprocessing module 112 and amemory 113.Processing module 112 may be a microprocessor, microcontroller, application-specific integrated circuit (ASIC), field-programmable gate array (FPGA), or any combination of components configured to perform and/or control the functions ofcard 110.Memory 113 may be a read-only memory (ROM) such as EPROM or EEPROM, flash, or any other storage component capable of storing executory programs and information for use by theprocessing module 112. - In various embodiments,
card 110 may comprise aterminal interface 114.Terminal interface 114 is communicatively coupled toprocessing module 112.Terminal interface 114 may be configured for use whencard 110 is being used by itself (i.e., without the carrier 140), for example, whencard 110 is engaged directly in a sales transaction via a point-of-sale (POS) terminal at a retail store or a kiosk or an access control transaction at a computer or building. In various embodiments,terminal interface 114 may include one or more conductive pads or pins that make electrical contact with corresponding conductive pads or pins provided in the terminal or smart card reader. Data communication betweencard 110 and the terminal occurs throughterminal interface 114. In various embodiments, whencard 110 is engaged with the terminal or smart card reader for a transaction, some of the conductive pads ofterminal interface 114 provide paths by which electrical power flows from the terminal toprocessing module 112 andmemory 113 viapower line 119. This eliminates the need forcard 110 to have its own on-board power source, simplifying design and manufacture. - In various embodiments,
card 110 may also include acarrier interface 116.Carrier interface 116 is communicatively coupled toprocessing module 112.Carrier interface 116 may be configured for use withcarrier 140. In various embodiments,carrier interface 116 may include one or more conductive pads or pins that make electrical contact with a corresponding card interface 144 insmart card carrier 140. In various embodiments, whencard 110 is engaged withsmart card carrier 140, some of the conductive pads or pins ofcarrier interface 116 provide paths by which electrical power flows frompower source 146 ofcarrier 140 toprocessing module 112 andmemory 113 viapower line 119, similar to the power management described above betweencard 110 and a terminal while conducting a transaction. - Although shown in
FIG. 1 as two different interfaces, one having ordinary skill in the art would understand thatterminal interface 114 andcarrier interface 116 may be combined into a single interface. - In various embodiments,
carrier 140 comprises a housing, awireless transceiver module 142, a card interface 144, apower source 146, and anuser interface 148. In various embodiments, the housing of carrier may 140 may be constructed of one of more of plastic, metal, ceramic, glass, or other form-sustaining material. In various embodiments, the housing may comprise multiple panels made of one or more form-sustaining materials, or the housing may be constructed through injection molding techniques. In various embodiments, the housing ofcarrier 140 may comprise multiple layers. - In various embodiments, the components may be affixed to the housing in various ways. In some embodiments, the components may be affixed to the housing by physical fasteners, such as screws or rivets. In various embodiments, the components may be affixed to the housing through crimping, welding, soldering, taping, gluing or cementing. In various embodiments, the housing may include brackets and the components may be designed to be held in place by the brackets. In some embodiments, a printed circuit board (PCB) including at least some of the components may be affixed to the housing. In various embodiments, a combination of different affixation techniques may be employed.
- In various embodiments, the components of
carrier 140 are powered bypower source 146 viapower line 149. In various embodiments,power source 149 may be a removable battery, a rechargeable battery, a solar cell, an inductive loop, or other power storage and/or generating components. In various embodiments, the battery may be both a removable battery and a rechargeable battery, and the battery may be recharged by removing the battery from the carrier and using an external charging station to recharge. In various embodiments, recharging of a rechargeable battery may be accomplished through an input oncarrier 140, such as a micro USB port, or through induction technologies. In various embodiments,carrier 140 may include an input for receiving power from an external source, such as from an external power supply. - In various embodiments,
wireless transceiver module 142 may be configured to transmit and receive communications over several different wireless communications standards and/or technologies. Such standards/technologies may include Wi-Fi, Bluetooth, near field communications (NFC), RFID, WiMAX, LTE, or other standards. In various embodiments,wireless transceiver module 142 may be configured to transmit and receive over one or more wireless communications standards/technologies.Wireless transceiver module 142 may comprise multiple transmitter modules and receiver modules, and necessary modulation and demodulation modules as required to conduct wireless communications. -
Carrier 140 also includes anantenna 143 for conducting wireless communications.Antenna 143 is communicatively coupled towireless transceiver module 142. In various embodiments,antenna 143 may a multi-purpose antenna, designed to transmit and receive over various communication standards, orantenna 143 may comprise more than one antenna for different communication standards. In various embodiments,antenna 143 may be a directional antenna for increased security of wireless transmission. -
User interface 148 provides information to the user regarding the status of the transaction occurring. In various embodiments,user interface 148 may comprise one or more indicator lights configured to convey status information to the user in a variety of ways. The indicator lights may be LEDs or any other visual components. In various embodiments, only one indicator light may be provided that is configured to show a different color based on whethercard 110 is probably connected with carrier 140 (red), whether the system is operational (green), or whether a transaction is processing (yellow). The recitation of green, red, and yellow as the colors of the indicators merely used as an example; any combination of colors is in accordance with the technology herein disclosed. Instead of using colors, in various embodiments there may be an indicator light for each of a number of different labeled indicators, such as “ON,” “TRANSMITTING,” “ERROR,” or other type of information that would be pertinent to the user while conducting a transaction. - In various embodiments,
user interface 148 may be a visual display, such as an LCD display or other visual/textual display. In these embodiments,user interface 148 would indicate in a visual manner to the user the status of the system and any transactions being conducted. In various embodiments, the visual display may be a touch-screen. - In various embodiments,
user interface 148 may also include a power-on capability. This capability may be a switch, button, or other method of powering on and offcarrier 140. In various embodiments, this capability may be separate fromuser interface 148. - In various embodiments,
user interface 148 may a combination of the different interfaces discussed above. For example,user interface 148 may include a row of indicator lights and an LCD display, providing both visual indications from the indicator lights as well as textual explanations of the current status of the system. - In various embodiments,
carrier 140 may also include a processing module (not shown) and memory (not shown) for performing operations related touser interface 148. In some embodiments,user interface 148 may be embedded oncard 110. In such embodiments, the user interface may operate in the same manner as discussed above with regards touser interface 148 oncarrier 140. In some embodiments, bothcarrier 148 andcard 110 may include a user interface. - As described above, there are many different types of smart card architectures that may be used by card designers.
Card 110 inFIG. 1 represents only one example smart card. Smart cards compatible with the technology herein disclosed may have additional components, such as additional layers of transactional security. These other types of smart cards may include security features, such as personal identification numbers (PINs), passwords, or biometric security features that must be authenticated prior to a transaction being completed.FIG. 2 is another example of smart card system 200 with acard 210 having an additional security layer of a biometric authentication unit included. AlthoughFIG. 2 describes the technology herein disclosed using a biometric authentication unit, the technology is similar to and compatible with smart cards using different security techniques and should not be interpreted to limit the technology herein disclosed to biometric authorization systems. -
Card 210 includes similar components ofcard 110, including aprocessing module 112, amemory 113, acarrier interface 116, aterminal interface 114, andpower line 119. These components operate in a similar fashion to the discussion above with respect toFIG. 1 regarding the components ofcard 110. In addition,card 210 includes abiometric authentication module 220. In various embodiments,biometric authentication module 220 includes anauthentication memory 224, acontroller module 226, and abiometric sensor 222.Authentication memory 224 may be configured to store a image or template of the biometric characteristics of an authorized user for authentication purposes.Authentication memory 224 may be a read-only memory (ROM) such as EPROM or EEPROM, flash, or any other storage component capable of storing biometric data of one or more authorized users at thetime card 210 is issued. In various embodiments,authentication memory 224 may be capable of both read and write commands to allow for the addition of other later authorized users through a reassignment process after issuance of the card. In various embodiments,authentication memory 224 andmemory 113 may be the same component. -
Controller 226 is a processing module configured to execute authentication application programming stored inmemory 224. In various embodiments,controller 226 accepts a biometric input fromsensor 222 and creates a biometric image template for authentication, as described in more detail below. In other embodiments,controller 226 can receive an already created biometric image template fromsensor 222 already formatted for authentication purposes. In various embodiments,controller 226 performs the biometric authentication process by comparing the biometric image template with the stored biometric data fromauthentication memory 224.Controller 226 is coupled toprocessing module 112 throughconnection 229. When a transaction is occurring,processing module 112 sends an authentication request tocontroller 226.Controller 222 then compares the biometric image template against the biometric data (e.g., a biometric template or image) stored inauthentication memory 224. In some embodiments,controller 226 determines if the biometric image template is within a predetermined threshold value of the stored biometric data. Such a threshold value can be stored inauthentication memory 224. If there is a match,controller 226 sends an indication toprocessing module 112 that the user is authenticated and the transaction may proceed. If there is not a match,controller 226 sends an indication toprocessing module 112 that the user is not authorized to conduct the transaction and to terminate the transaction session. In various embodiments,controller 226 may be a separate hardware processing module fromprocessing module 112. In various embodiments,controller 226 may be implemented in software, such as a virtual machine (VM) executed usingprocessing module 112. In such an embodiment, additional security features may be implemented withinprocessing module 112, such as partitioning between the VM and the card operating system to ensure that no unauthorized access to the controller module occurs. In various embodiments, the authentication application programming executed bycontroller 226 may be stored inmemory 113 and accessible bycontroller 226 throughprocessing module 112. In various embodiments,controller 226 may have direct access tomemory 113. - In various embodiments,
biometric sensor 222 is a biometric reader or scanner capable of reading or scanning one or more biometrics of a user. Biometrics are human characteristics unique to an individual. In various embodiments,biometric sensor 222 may be configured as a fingerprint scanner, an iris scanner, a voice-identification unit, or other physiological characteristic of an individual. As discussed above, the biometric input fromsensor 222 can be sent directly tocontroller 226 in order to allowcontroller 226 to create the biometric image template. In various embodiments,sensor 222 may be capable of turning the biometric input from the user into the biometric image template necessary for comparison. - In various embodiments,
card 210 may have only a single component for processing both the transaction and authentication functions ofcard 210. In various embodiments, this single processing component may be processingmodule 112, andprocessing module 112 may be configured to execute both transaction applications and the functions ofcontroller 226 described above. This eliminates the need for multiple processing units on the card and lowers the complexity of the design. - It may be useful to allow for the processing functions of the smart card to be performed by the carrier in certain situations, such as when the card designer intended for the processing to occur off the card to achieve a simpler card design. Such an example system is shown in
FIG. 3 .Carrier 340 is similar tocarrier 140 shown inFIGS. 1 and 2 , but also includes an on-board processing module 350 andmemory 354. In various embodiments,processing module 350 may perform all the functions ofcarrier 350, including controllingwireless transceiver 142 anduser interface 148, like the processing module and memory described (but not shown) inFIG. 1 . In various embodiments,processing module 350 may be a separate processing component for performing the transaction application(s) ofcard 310. Unless otherwise discussed, the other components depicted inFIG. 3 may operate in various embodiments in the same manner as discussed with respect to corresponding components inFIGS. 1 and 2 . - In various embodiments of the system depicted in
FIG. 3 ,carrier 340 receives the biometric input fromsensor 222 and the biometric template stored inauthentication memory 224 viacarrier interface 116. In various embodiments,controller 226 may be the same asprocessing module 112, only without the functionality to perform the authentication process.Controller 226 sends the biometric data fromsensor 222 andauthentication memory 224 tocarrier interface 116 overconnection 329.Processing module 350 ofcarrier 340 receives the biometric data from viacard interface 146 overconnections 352 and performs the authentication function as described with respect toFIG. 2 . In various embodiments,memory 354 may store the authentication application, transaction application(s), or both. In various embodiments,controller 226 may send the biometric input fromsensor 222 tocarrier 140, andprocessing module 350 can accessmemory 354 for the necessary authentication application and perform the authentication process. In various embodiments, the authentication program may be stored inauthentication memory 224, and the program may also be sent tocarrier 340 viacarrier interface 116. In various embodiments,memory 354 can store the biometric data discussed above with regards toauthentication memory 224 for authentication purposes. - Although
carrier 340 has been described as performing the authentication functions ofcard 310, this should not be read to limit the functionality ofcarrier 340.Carrier 340 may be designed to perform any transaction or function associated withcard 310, or any other smart card employed. In various embodiments,carrier 340 may perform any function stored on or designed to be performed bycard 310, or other smart card employed in the system. In various embodiments,memory 354 may store all the applications necessary to conduct any financial transaction or access authorization to a facility or computer system. - Although
FIGS. 1-3 describe the processing function as being performed by either the carrier or the smart card, various embodiments include both the carrier and the smart card to have processing capabilities. An example of asystem employing carrier 340 andcard 210 is shown inFIG. 4 . Bothcarrier 340 andcard 210 include processing modules (modules card 210 is inserted intocarrier 340,carrier 340 may send a command to card 210 viacard interface 146 to forward all required information tocarrier 340 for processing. In various embodiments,card 210 may perform all the processing, as discussed with respect toFIG. 2 , andprocessing module 350 may only process information related to functionality of the carrier, such as the display ofuser interface 148. In various embodiments,card 210 andcarrier 340 may share processing functions, such as authentication occurring oncard 210 but completion of the transaction occurring oncarrier 340. In some embodiments,authentication module 220 may communicate directly withcarrier 340.Carrier 340 may send a request directly toauthentication module 220 throughcarrier interface 116 overdata line 228. In various embodiments,carrier 340 may send a request toprocessing module 112, requesting information fromauthentication module 220.Authentication module 220 can then send the requested data directly tocarrier interface 116 overdata line 228, instead of sending the data toprocessing module 112 overdata line 229. In this way,carrier 340 may communicate withauthentication module 220 without needing to pass all messages throughprocessing module 112. - In various embodiments,
carrier 340 may be restricted to use with only certain smart cards. For example,memory 354 may store an authorized list of the smart cards with whichcarrier 340 may operate. In various embodiments, the authorized list may identify the authorized smart cards based on a serial number or other identifying information of the cards themselves. - Instead of restricting use of
carrier 340 to only certain smart cards, use can be restricted to only certain individuals.Memory 354 may store a set of authentication data, such as a copy of the biometric data stored inauthentication memory 224, a passcode, or PIN, for each individual authorized to usecarrier 340. When a person attempts to usecarrier 340 with a smart card enabled with additional levels of security,carrier 340 may refuse to allow wireless communication until the person is authorized to usecarrier 340. In this way, the carrier could be personalized for use only be one individual, in the event that someone tries to usecarrier 340 to conduct wireless transactions. -
FIGS. 5 and 6 are high-level diagrams showing how the cards and carriers such as the ones shown inFIGS. 1-4 interact in a system in accordance with the technology. InFIG. 5 ,card 210A is shown separate fromcarrier 140A. As indicated by the arrows, thehousing 300 ofcarrier 140A has opening 310 configured to accommodate or acceptcard 210A. The top face ofcarrier 140A is shorter than the length ofcard 210A to enable access tobiometric sensor 222.FIG. 6 shows an example of howcard 210A fits withincarrier 140A throughopening 310. As shown, thebiometric sensor 222 oncard 210A remains accessible by a user aftercard 210A is inserted intocarrier 140A. AlthoughFIGS. 5 and 6 show one configuration ofcarrier 140A, other configurations are contemplated by the technology herein disclosed, andFIGS. 5 and 6 should not be interpreted to limit the scope of the present disclosure in any way. - In various embodiments, the smart card carrier may include a cut-out providing access to a biometric sensor provided on a smart card and facilitate the use of the biometric security layer.
FIGS. 7 and 8 illustrate an example of this configuration. There is acutout 145 in the top face ofcarrier 140B over the portion ofcard 210B containingbiometric sensor 222. This cutout provides greater protection of card integrity by fully enveloping the card while still allowing full access and implementation of the biometric security layer. - Although
FIGS. 5-8 discuss the embodiments in terms of a “top” face and a “bottom” face, the use of such language are merely descriptive and do not imply or require that the disclosed technology be implemented or used in a particular spatial orientation. -
FIGS. 9-11 illustrate example environments and transactions that may be conducted in accordance with the technology herein disclosed. AlthoughFIGS. 9-11 are shown usingcard 210 described above, the system architecture is similar to and functions in a similar manner utilizing smart cards in accordance withcard 110,card 310, or any other smart card. The use ofcard 210 is for example purposes only and should not be interpreted to limit the scope of the technology herein disclosed. -
FIG. 9 illustratestransaction system 900 comprising a smart card and aPOS terminal 910. For the purpose of illustration, the smart card shown inFIG. 9 iscard 210 illustrated inFIG. 2 , but the smart card can becard 110,card 310, or any other smart card. In this embodiment,card 210 is used withoutcarrier 140 orcarrier 340.Terminal 910 includes aninterface 914, which may be any type of smart card reader known in the art. In various embodiments, terminal 910 may also include aterminal processing module 912 and aterminal memory 913.Card 210 interacts withterminal 910 through a physical connection ofterminal interface 114 andinterface 914. This connection is made by insertingcard 210 into a smart card reader ofterminal 910. In various embodiments, terminal 910 supplies power to card 210 through this physical connection, in a similar fashion as described above in regards to the description ofterminal interface 114 inFIG. 1 .Terminal 910 is connected to a transaction processing center (TPC) 920. In various embodiments,TPC 920 may be operated by a user's bank, a smart card issuer, a merchant, or some other entity, and may include aserver 922 and auser database 924 for storing, processing, and authorizing transactions between the smart card user and the merchant.Terminal 910 andTPC 920 may be connected over a network 302. In various embodiments, terminal 910 and -
TPC 920 may be geographically displaced andnetwork 902 may be an Internet connection. In various embodiments, terminal 910 andTPC 920 may be co-located and connected through a local area network (LAN) or intranet connection. The method of transaction betweenterminal 910 andTPC 920 is not required to understand the technology herein and outside the scope of this disclosure. - To conduct a transaction, terminal 910 sends a request to conduct a transaction via
interface 914 to card 210 viaterminal interface 114.Processing module 112 receives the request and sends an activation message tocontroller 226 to activatebiometric authentication module 220. As discussed above,card 210 receives power throughterminal interface 114 fromterminal 910, which powers the components ofcard 210 viapower line 119. After activation,controller 226 receives biometric input fromsensor 222. The biometric input received is contingent on the type of sensor employed, such as a fingerprint scanner or an iris scanner. Aftercontroller 226 receives one or more inputs frombiometric sensor 222,controller 226 access the stored biometric data inauthentication memory 224 and determines whether there is a match. If there is a match,controller 226 sends a message toprocessing module 112 viaconnection 229 that the transaction is authorized to be conducted. After receiving the authentication notification,processing module 112 may execute application instructions stored inmemory 113 and transmit to terminal 910 the information (e.g., a password or certificate) necessary to complete the transaction viaterminal interface 114. In some embodiments, the password or certificate is encrypted before it is transmitted. - In various embodiments, if
controller 226 determines that there is not a match between the biometric input fromsensor 222 and the biometric data stored inmemory 224,controller 226 sends an indication or notification toprocessing module 112 overconnection 229 that the user is not authorized to conduct the transaction. In various embodiments,processing module 112 may simply not respond to the request fromterminal 910. In other embodiments,processing module 112 may execute an application instruction stored inmemory 113 regarding unauthorized access attempts and send a notification toterminal 910. In some embodiments, upon receiving one or more indications of unauthorized use fromcontroller 226,processing module 112 deactivates thecard 210 to prevent a further attempt. - In accordance with the technology disclosed herein, the same transaction process discussed above in regards to
FIG. 9 may be conducted wirelessly usingcarrier 140 described and shown inFIGS. 1 and 2 . Such a use is illustrated inFIG. 10 bytransaction system 1000.Terminal 1010 is similar to terminal 910 shown onFIG. 9 . In various embodiments, terminal 1010 may include aterminal transceiver 1014, communicatively coupled to anantenna 1015, to enable wireless transactions to occur. In various embodiments, terminal 1010 may also include an interface, like theinterface 914 interminal 910 ofFIG. 9 , but such an interface is not required in terminal 1010.Card 210 is inserted intocarrier 140 in a manner similar to that shown inFIGS. 5-8 . Unlike the transaction described inFIG. 9 ,card 210 does not interact directly with terminal 1010 but instead communicates with terminal 1010 throughwireless transceiver module 142 ofcarrier 140.Terminal 1010 sends a request to conduct a transaction viaterminal transceiver 1014 towireless transceiver module 142 ofcarrier 140. As discussed above, the communication standard used depends on the type of wireless transceiver employed within terminal 1010 andcarrier 140. In various embodiments,wireless transceiver 142 may be compatible with more than one communication standard/technology, such as Bluetooth, NFC, and Wi-Fi, in order to provide greater operability ofcarrier 140 with a variety of systems. -
Wireless transceiver module 142 then transfers the request message tocard interface 146, which is communicatively coupled tocarrier interface 116 ofcard 210. In this way, the message from terminal 1010 is communicated toprocessing module 112 ofcard 210 withoutcard 210 physically in contact with terminal 1010.Processing module 112 operates in the same manner as if it was in physical contact with terminal 1010, similar to the operation discussed above in regards toFIG. 9 . - Just as
terminal 910 provided power to card 210 throughterminal interface 914,carrier 140 supplies power frompower source 146 to card 210 throughcard interface 146. In this way, no on-board power source is required oncard 210 topower authentication module 220,processing module 112, or any other components that might be present incard 210. In this way, the enhanced capability of conducting wireless transactions may be provided to a simple contact smart card. Wireless transceivers capable of Bluetooth, Wi-Fi, or other higher-protocol communication standards or technologies require more power than could feasibly be included in the form factor of a credit card in a cost effective manner. - Moreover, use of an external contactless transaction system in accordance with the technology disclosed herein, like
carrier 140, allows for smart cards with additional layers of security to be created and compatible with many different systems. For example, a smart card with a biometric sensor such ascard 210 ofFIG. 2 would not be able to function easily with a transaction system, like an ATM machine, that requires the entire card to be inserted into the machine and to remain there during the entirety of the transaction. This feature is for security purposes, to ensure that someone cannot come and easily swipe a person's ATM card. However, it makes it impossible to utilize the biometric authentication feature of the card. Using a smart card carrier such ascarrier 140 allows for ease of use of the biometric authentication feature. - As technology continues to advance, transactions are occurring not only at POS terminals in fixed locations, but also with mobile devices. In various embodiments, these mobile devices may include hand held POS terminals, mobile card readers, smartphones, PDAs, laptop computers, tablet computers, or other portable computing devices. Accordingly,
FIG. 11 illustrates anexample transaction system 1100 including amobile terminal 1110. Although mobile terminal 1110 is different from terminal 1010, the transaction would occur in a way similar to the transaction described inFIG. 10 . - An example method of conducting wireless transactions with a contact smart card using a smart card carrier in accordance with the technology disclosed herein is provided.
FIG. 12 details the steps of the method from the perspective of the smart card carrier. Atstep 610, the smart card carrier receives a transaction request wirelessly sent from a POS or mobile terminal. In various embodiments, the transaction request could be one of the following non-limiting examples: credit or debit charges, computer access, or facility access. A wireless transceiver in the smart card carrier receives the request from the POS or mobile terminal. The request could be communicated using a variety of different wireless communication standards or technologies, including Bluetooth, Wi-Fi, NFC, RFID, or others. - At
step 620, the smart card carrier engages in data communication with one or more processors on a smart card. In various embodiments, the data communication involves request by the smart card carrier for information from the smart card. For example, where the smart card carrier is capable of conducting an authentication process, the data communication may be a request for the smart card to transmit stored biometric or other authentication-related data from a memory on the smart card to the carrier. In other embodiments, the data communication between the smart card carrier and the smart card may be a transfer of the transaction request as received by the smart card carrier to the smart card for processing. In other embodiments, the data communication could be any other type of communication related to the transaction request, such as communications about where the authentication procedure occurs or the an indication of the results of authentication. The smart card interface is communicatively coupled to the contacts of the contact smart card. - The method transitions at point A to the example processing of the request by the smart card, illustrated in
FIG. 13 . Although depicted as processing by a biometric secured smart card, the flowchart is only an example of one embodiment of the method. For contact smart cards without additional security features, the method would exclude the authentication process and simply send a response to a transaction request. - At
step 710, the smart card receives the data communication related to the transaction request of a terminal from the smart card carrier through the smart card's contact points. In some embodiments, the request appears as an ordinary request through the smart card's contact points because it is engaged with the smart card carrier in the same fashion as if the smart card was engaged with the terminal directly, e.g., viaterminal interface 114 shown inFIGS. 1 and 2 . In other embodiments, the request from the smart card carrier may be a data communication related to the transaction request, but not the transaction request as originally received, as discussed above with respect to step 620 ofFIG. 12 . In various embodiments, the request transferred to the smart card may be any type of data communication necessary to complete the transaction according to the type and location of the processing functions required. The request is sent to one or more processing modules of the smart card. - If the smart card has additional layers of security, the authentication process is activated at
step 720. In this example, the authentication process is a biometric security check. In various embodiments, other types of layered security may be used, such as a PIN or a password, in lieu of or in addition to the biometric authentication. In embodiments where the authentication process occurs at the smart card carrier, one or more of the steps 720-770 may occur at the smart card carrier instead of on the biometric smart card. - At
step 730, the card receives the user's biometric signature. In various embodiments, the user's biometric signature may be a fingerprint, a voice sample, an iris scan, or other biometric characteristic utilized to authenticate the user's identity. In various embodiments, the user may enter a PIN or password associated with the user atstep 730. - At
step 740, the user's biometric signature is compared with a biometric template stored on the smart card. This biometric template may be stored in an authentication memory separate from any other memory of the smart card, or it could be stored in the same memory with other applications and data used by the smart card. In various embodiments, the template stored in memory may be a copy of the user's PIN or password for comparison. - The smart card decides whether the biometric signature is authentic at
step 750. The particular level of similarity or the metrics used to determine if a biometric signature is the same or similar enough to the template to qualify as authentic may vary. - If the signature is determined to be authentic, a notification of a successful authentication is sent to the card's contact points at
step 762. This notification could be a simple notice that the user is the authentic user, the relevant information requested by the terminal, or a combination of both. In various embodiments, the notification could also include additional indications, such as the level of accuracy of the authentication process or requests from the card for additional information from the terminal. The content of the notification may vary depending on the complexity built into the smart card applications or applications. - If the smart card determines the signature is not authentic, a notification of a failed authentication is sent to the card's contact points at
step 764. Similar to the notification for a success, the notification of failure may include additional information related to the failure, such as request for the terminal to contact the smart card issuer or a request to restart the transaction process. In various embodiments, if the authentication is unsuccessful the smart card could send no message to the contact points and instead merely ignore the transaction request. - At
step 770, the smart card can deactivate the authentication module. In various embodiments, the authentication process may need to only be completed once during a transaction session. The result of a successful authentication could be stored in a memory of the smart card for the duration of a transaction session. In other embodiments, the authentication process may be repeated for each request received by the smart card. - After the smart card processes the transaction request, a response is received from the smart card via the card interface of the smart card carrier at
step 630 ofFIG. 12 . - At
step 640, the card interface transfers the response to the wireless transceiver for transmission to the requesting terminal. This is done in the same, but reversed, manner asstep 620. - At
step 650, the wireless transceiver transmits the response to terminal. If no further action is required the transaction is completed. If more information is needed or additional actions are to be taken, the method may repeat itself. - In various embodiments,
cards carriers carriers FIG. 2 again, reentering the passcode, password, or other identifying code of the user, or other authentication method. - Use of location-based authentication may also provide additional security when the smart card is being used as a method of restricting access to certain areas within a facility. A particular smart card may be issued to a certain individual, who is authorized to enter certain areas of a facility, base, headquarters, or other location.
Carriers FIGS. 2 and 12-13 to verify that the holder is the person with proper access to that area. In various embodiments, the network may be programmed to send out the periodic request. This is useful in eliminating the risk of unauthorized access to areas by persons who steal another person's access card, or who happen to find a card that is misplaced by the authorized person, for example if the card fell out of the authorized person's pocket. In various embodiments, the holder may be required to verify his or her identity each time access is requested to an area within the facility. This authentication process is also applicable to access to non-physical areas, such as access to computer networks. - As used herein, the term module might describe a given unit of functionality that can be performed in accordance with one or more embodiments of the technology disclosed herein. As used herein, a module might be implemented utilizing any form of hardware, software, or a combination thereof. For example, one or more processors, controllers, ASICs, PLAs, PALs, CPLDs, FPGAs, logical components, software routines or other mechanisms might be implemented to make up a module. In implementation, the various modules described herein might be implemented as discrete modules or the functions and features described can be shared in part or in total among one or more modules. In other words, as would be apparent to one of ordinary skill in the art after reading this description, the various features and functionality described herein may be implemented in any given application and can be implemented in one or more separate or shared modules in various combinations and permutations. Even though various features or elements of functionality may be individually described or claimed as separate modules, one of ordinary skill in the art will understand that these features and functionality can be shared among one or more common software and hardware elements, and such description shall not require or imply that separate hardware or software components are used to implement such features or functionality.
- While various embodiments of the disclosed technology have been described above, it should be understood that they have been presented by way of example only, and not of limitation. Likewise, the various diagrams may depict an example architectural or other configuration for the disclosed technology, which is done to aid in understanding the features and functionality that can be included in the disclosed technology. The disclosed technology is not restricted to the illustrated example architectures or configurations, but the desired features can be implemented using a variety of alternative architectures and configurations. Indeed, it will be apparent to one of skill in the art how alternative functional, logical or physical partitioning and configurations can be implemented to implement the desired features of the technology disclosed herein. Also, a multitude of different constituent module names other than those depicted herein can be applied to the various partitions. Additionally, with regard to flow diagrams, operational descriptions and method claims, the order in which the steps are presented herein shall not mandate that various embodiments be implemented to perform the recited functionality in the same order unless the context dictates otherwise.
- Although the disclosed technology is described above in terms of various exemplary embodiments and implementations, it should be understood that the various features, aspects and functionality described in one or more of the individual embodiments are not limited in their applicability to the particular embodiment with which they are described, but instead can be applied, alone or in various combinations, to one or more of the other embodiments of the disclosed technology, whether or not such embodiments are described and whether or not such features are presented as being a part of a described embodiment. Thus, the breadth and scope of the technology disclosed herein should not be limited by any of the above-described exemplary embodiments.
- Terms and phrases used in this document, and variations thereof, unless otherwise expressly stated, should be construed as open ended as opposed to limiting. As examples of the foregoing: the term “including” should be read as meaning “including, without limitation” or the like; the term “example” is used to provide exemplary instances of the item in discussion, not an exhaustive or limiting list thereof; the terms “a” or “an” should be read as meaning “at least one,” “one or more” or the like; and adjectives such as “conventional,” “traditional,” “normal,” “standard,” “known” and terms of similar meaning should not be construed as limiting the item described to a given time period or to an item available as of a given time, but instead should be read to encompass conventional, traditional, normal, or standard technologies that may be available or known now or at any time in the future. Likewise, where this document refers to technologies that would be apparent or known to one of ordinary skill in the art, such technologies encompass those apparent or known to the skilled artisan now or at any time in the future.
- The presence of broadening words and phrases such as “one or more,” “at least,” “but not limited to” or other like phrases in some instances shall not be read to mean that the narrower case is intended or required in instances where such broadening phrases may be absent. The use of the term “module” does not imply that the components or functionality described or claimed as part of the module are all configured in a common package. Indeed, any or all of the various components of a module, whether control logic or other components, can be combined in a single package or separately maintained and can further be distributed in multiple groupings or packages or across multiple locations.
- Additionally, the various embodiments set forth herein are described in terms of exemplary block diagrams, flow charts and other illustrations. As will become apparent to one of ordinary skill in the art after reading this document, the illustrated embodiments and their various alternatives can be implemented without confinement to the illustrated examples. For example, block diagrams and their accompanying description should not be construed as mandating a particular architecture or configuration.
Claims (23)
1. A smart card carrier comprising:
a housing having an opening configured to accept a smart card;
a smart card interface configured to be coupled to the smart card when the smart card is accepted into the opening and configured to provide a data communication link with one or more processors in the smart card;
a wireless transceiver configured to engage in wireless data communication with a transaction terminal when the smart card interface is coupled to the smart card; and
a power source configured to supply power to the wireless transceiver and the smart card interface.
2. The smart card carrier of claim 1 , wherein the wireless transceiver is configured to communicate over one or more of Bluetooth, Wi-Fi, near field communication, and RFID.
3. The smart card carrier of claim 1 , further comprising a user interface, wherein the user interface comprises one or more indicator lights and wherein the indicator lights are configured to communicate a status of the transaction to the user.
4. The smart card carrier of claim 1 , further comprising a user interface, wherein the user interface comprises a text display and wherein the text display is configured to communicate a status of the transaction to the user.
5. The smart card carrier of claim 1 , wherein the smart card interface is further configured to supply power from the power source to the smart card when the smart card interface is coupled to the smart card.
6. The smart card carrier of claim 1 , wherein the user interface comprises a number pad and wherein the number pad is configured to allow a user to enter a security pin associated with the smart card.
7. The smart card carrier of claim 1 , wherein the housing comprises a top face and a bottom face that are parallel to each other and separated by a smart card space, wherein the smart card space is enclosed on three sides.
8. The smart card carrier of claim 7 , wherein the smart card comprises a biometric sensor, and the top face or bottom face are designed to allow access to the biometric sensor.
9. The smart card carrier of claim 8 , wherein the length of the top face or the bottom face is shorter than the length of the other of the top face or bottom face to allow access to the biometric sensor.
10. The smart card carrier of claim 8 , wherein the top face or bottom face includes an aperture configured to allow access to the biometric sensor of the smart card.
11. The smart card carrier of claim 8 , wherein the biometric sensor is a fingerprint sensor.
12. The smart card carrier of claim 1 , further comprising a processor, wherein the processor of the smart card carrier is configured to engage in data communication with the wireless transceiver and further with the one or more processors on the smart card.
13. The smart card carrier of claim 12 , wherein the one or more processors on the smart card comprise a biometric controller configured to generate a biometric image template based on a biometric image captured by a biometric sensor disposed on the smart card, and the processor of the smart card carrier is configured to perform a matching between the biometric image template received from the smart card and a biometric reference template.
14. The smart card carrier of claim 13 , further comprising a memory for storing the biometric reference template.
15. The smart card carrier of claim 13 , wherein the one or more processors in the smart card further comprise a processor configured to perform the matching between the biometric image template and the biometric reference template when the smart card is not coupled to the smart card interface of the smart card carrier.
16. The smart card carrier of claim 1 , further comprising a location-determining component.
17. A method of facilitating wireless transactions with a smart card through a smart card carrier, the method comprising:
receiving from a wireless transaction terminal a request related to a transaction involving the smart card;
engaging in data communication related to the request with one or more processors in the smart card through a smart card interface coupled to an interface on the smart card; and
transmitting a response to the request to the transaction terminal through the wireless transceiver.
18. The method of claim 17 , further comprising the step of authenticating a user of the smart card.
19. The method of claim 18 , wherein the step of authenticating the user comprises:
receiving a user input of a personal identification number;
comparing the user input with a stored personal identification number for a match; and
if a match is found, outputting a response to the request to the interface of the smart card.
20. The method of claim 18 , wherein the step of authenticating the user comprises:
receiving a user input of a biometric signature;
comparing the user input with a stored biometric for a match; and
if a match is found, outputting a response to the request to the interface of the smart card.
21. The method of claim 17 , wherein the wireless transaction terminal is a mobile device.
22. The method of claim 17 , wherein the wireless transaction terminal is a contactless smart card reader.
23. The method of claim 17 , further comprising the step of supplying power to the smart card via the smart card interface.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/292,134 US20190205575A1 (en) | 2015-01-14 | 2019-03-04 | Smart card system comprising a card and a carrier |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/596,572 US9607189B2 (en) | 2015-01-14 | 2015-01-14 | Smart card system comprising a card and a carrier |
US15/435,210 US9892292B2 (en) | 2015-01-14 | 2017-02-16 | Smart card systems comprising a card and a carrier |
US15/862,546 US10223555B2 (en) | 2015-01-14 | 2018-01-04 | Smart card systems comprising a card and a carrier |
US16/292,134 US20190205575A1 (en) | 2015-01-14 | 2019-03-04 | Smart card system comprising a card and a carrier |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/862,546 Continuation US10223555B2 (en) | 2015-01-14 | 2018-01-04 | Smart card systems comprising a card and a carrier |
Publications (1)
Publication Number | Publication Date |
---|---|
US20190205575A1 true US20190205575A1 (en) | 2019-07-04 |
Family
ID=56367773
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/596,572 Expired - Fee Related US9607189B2 (en) | 2015-01-14 | 2015-01-14 | Smart card system comprising a card and a carrier |
US15/435,210 Expired - Fee Related US9892292B2 (en) | 2015-01-14 | 2017-02-16 | Smart card systems comprising a card and a carrier |
US15/862,546 Expired - Fee Related US10223555B2 (en) | 2015-01-14 | 2018-01-04 | Smart card systems comprising a card and a carrier |
US16/292,134 Abandoned US20190205575A1 (en) | 2015-01-14 | 2019-03-04 | Smart card system comprising a card and a carrier |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/596,572 Expired - Fee Related US9607189B2 (en) | 2015-01-14 | 2015-01-14 | Smart card system comprising a card and a carrier |
US15/435,210 Expired - Fee Related US9892292B2 (en) | 2015-01-14 | 2017-02-16 | Smart card systems comprising a card and a carrier |
US15/862,546 Expired - Fee Related US10223555B2 (en) | 2015-01-14 | 2018-01-04 | Smart card systems comprising a card and a carrier |
Country Status (6)
Country | Link |
---|---|
US (4) | US9607189B2 (en) |
EP (1) | EP3245618A4 (en) |
KR (1) | KR20170106998A (en) |
CN (1) | CN107251057A (en) |
SG (1) | SG11201705778UA (en) |
WO (1) | WO2016113626A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022039867A1 (en) * | 2020-08-17 | 2022-02-24 | Mastercard International Incorporated | Card reader, smart card and method for processing a transaction |
Families Citing this family (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016119702A1 (en) * | 2015-01-27 | 2016-08-04 | 深圳光启智能光子技术有限公司 | Optical communication transmitting apparatus and receiving apparatus |
US10658880B2 (en) * | 2015-03-06 | 2020-05-19 | Samsung Electronics Co., Ltd. | Electronic device for operating powerless sensor and control method thereof |
DE102015108330A1 (en) * | 2015-05-27 | 2016-12-01 | Bundesdruckerei Gmbh | Electronic access control procedure |
US9773153B1 (en) * | 2016-03-24 | 2017-09-26 | Fingerprint Cards Ab | Fingerprint sensor module |
JP6721435B2 (en) * | 2016-07-04 | 2020-07-15 | 株式会社東芝 | IC card, portable electronic device, and information processing method |
US10057249B2 (en) | 2016-07-20 | 2018-08-21 | Bank Of America Corporation | Preventing unauthorized access to secured information systems using tokenized authentication techniques |
US10057255B2 (en) | 2016-07-20 | 2018-08-21 | Bank Of America Corporation | Preventing unauthorized access to secured information systems using multi-device authentication techniques |
US10148646B2 (en) | 2016-07-20 | 2018-12-04 | Bank Of America Corporation | Preventing unauthorized access to secured information systems using tokenized authentication techniques |
KR20180057835A (en) | 2016-11-23 | 2018-05-31 | 삼성전자주식회사 | Wearable-type electronic device with finger print scan sensor |
USD855617S1 (en) * | 2017-01-17 | 2019-08-06 | David Williams | Smart card |
US10984304B2 (en) | 2017-02-02 | 2021-04-20 | Jonny B. Vu | Methods for placing an EMV chip onto a metal card |
US10775906B2 (en) | 2017-12-12 | 2020-09-15 | Idex Biometrics Asa | Power source for biometric enrollment with status indicators |
US11250307B2 (en) | 2017-03-23 | 2022-02-15 | Idex Biometrics Asa | Secure, remote biometric enrollment |
US10282651B2 (en) | 2017-03-23 | 2019-05-07 | Idex Asa | Sensor array system selectively configurable as a fingerprint sensor or data entry device |
CN108038532B (en) * | 2017-12-08 | 2021-01-26 | 恒宝股份有限公司 | Intelligent card and control method thereof |
US10755157B2 (en) | 2018-03-23 | 2020-08-25 | International Business Machines Corporation | Advance alert system against copy of contact-less card information |
US10628722B2 (en) * | 2018-03-23 | 2020-04-21 | International Business Machines Corporation | Method and apparatus to enhance the security of contact-less cards |
GB2575087A (en) * | 2018-06-28 | 2020-01-01 | Zwipe As | Biometric Enrolment |
US11188908B2 (en) * | 2018-07-12 | 2021-11-30 | Capital One Services, Llc | Multi-function transaction card |
US11449586B2 (en) | 2018-07-20 | 2022-09-20 | Massachusetts Institute Of Technology | Authenticated intention |
USD956760S1 (en) * | 2018-07-30 | 2022-07-05 | Lion Credit Card Inc. | Multi EMV chip card |
FR3084942B1 (en) * | 2018-08-07 | 2021-07-30 | Idemia Identity & Security France | ACQUISITION OF A BIOMETRIC FOOTPRINT FROM A CHIP CARD |
WO2020072670A1 (en) * | 2018-10-02 | 2020-04-09 | Capital One Services, Llc | Systems and methods for cryptographic authentication of contactless cards |
CN109241786A (en) * | 2018-10-08 | 2019-01-18 | 赵建和 | A kind of independent flash card |
TWI830784B (en) * | 2019-09-27 | 2024-02-01 | 挪威商斯外普公司 | Biometric enrolment |
US10762502B1 (en) * | 2019-10-10 | 2020-09-01 | Capital One Services, Llc | Providing an alert to a cardholder |
FR3108755B1 (en) * | 2020-03-27 | 2022-04-29 | St Microelectronics Rousset | Microcircuit card |
US11055683B1 (en) * | 2020-04-02 | 2021-07-06 | Capital One Services, Llc | Computer-based systems involving fingerprint or biometrically-activated transaction cards and methods of use thereof |
KR20220156685A (en) * | 2021-05-18 | 2022-11-28 | 삼성전자주식회사 | Ic card including registered biometic information and registerd pin information, and operation method thereof, and operation method of card reader communicating with the ic card |
EP4120165A1 (en) * | 2021-07-16 | 2023-01-18 | Thales DIS France SA | Method for managing a smart card |
WO2023086083A1 (en) * | 2021-11-10 | 2023-05-19 | Hewlett-Packard Development Company, L.P. | Communications cards indicators |
FR3135551A1 (en) * | 2022-05-11 | 2023-11-17 | Smart Packaging Solutions | Coupling device for near-field communication between a smart card and a radio frequency transmitter. |
WO2024031095A1 (en) * | 2022-08-05 | 2024-02-08 | Wyffels Grant | Multiple-chip smart card |
Family Cites Families (355)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE425704B (en) | 1981-03-18 | 1982-10-25 | Loefberg Bo | DATABERARE |
US4910521A (en) | 1981-08-03 | 1990-03-20 | Texas Instruments Incorporated | Dual band communication receiver |
US4453074A (en) | 1981-10-19 | 1984-06-05 | American Express Company | Protection system for intelligent cards |
US4747147A (en) | 1985-09-03 | 1988-05-24 | Sparrow Malcolm K | Fingerprint recognition and retrieval system |
US4725719A (en) | 1986-07-21 | 1988-02-16 | First City National Bank Of Austin | Restricted purpose, commercial, monetary regulation method |
US5180902A (en) | 1988-04-21 | 1993-01-19 | David Schick | Self verifying transaction card with disabling capability |
JPH0288859A (en) | 1988-09-26 | 1990-03-29 | Hitachi Maxell Ltd | Systematized control for entering or leaving room with ic card |
JPH02118790A (en) | 1988-10-27 | 1990-05-07 | Nec Corp | Ic card with fingerprint collating function |
US5245329A (en) | 1989-02-27 | 1993-09-14 | Security People Inc. | Access control system with mechanical keys which store data |
ZA907106B (en) | 1989-10-06 | 1991-09-25 | Net 1 Products Pty Ltd | Funds transfer system |
US4993068A (en) | 1989-11-27 | 1991-02-12 | Motorola, Inc. | Unforgeable personal identification system |
JPH0424889A (en) | 1990-05-21 | 1992-01-28 | Toshiba Corp | Ic card provided with personal identification function |
IL94848A (en) | 1990-06-22 | 1993-08-18 | Gur Shomron | Credit card |
US5193114A (en) | 1991-08-08 | 1993-03-09 | Moseley Donald R | Consumer oriented smart card system and authentication techniques |
JP3083187B2 (en) | 1991-09-30 | 2000-09-04 | 富士通株式会社 | Key management method of electronic wallet system |
US5534857A (en) | 1991-11-12 | 1996-07-09 | Security Domain Pty. Ltd. | Method and system for secure, decentralized personalization of smart cards |
EP0599244B1 (en) * | 1992-11-27 | 1999-04-14 | Denso Corporation | Portable electronic device |
US5581630A (en) | 1992-12-21 | 1996-12-03 | Texas Instruments Incorporated | Personal identification |
US5559504A (en) | 1993-01-08 | 1996-09-24 | Kabushiki Kaisha Toshiba | Surface shape sensor, identification device using this sensor, and protected system using this device |
US5321751A (en) | 1993-02-18 | 1994-06-14 | Eastman Kodak Company | Method and apparatus for credit card verification |
US5884292A (en) | 1993-05-06 | 1999-03-16 | Pitney Bowes Inc. | System for smart card funds refill |
US5677953A (en) | 1993-09-14 | 1997-10-14 | Spyrus, Inc. | System and method for access control for portable data storage media |
US5438184A (en) | 1993-10-26 | 1995-08-01 | Verifone Inc. | Method and apparatus for electronic cash transactions |
US5920847A (en) | 1993-11-01 | 1999-07-06 | Visa International Service Association | Electronic bill pay system |
US5521966A (en) | 1993-12-14 | 1996-05-28 | At&T Corp. | Method and system for mediating transactions that use portable smart cards |
US5578808A (en) | 1993-12-22 | 1996-11-26 | Datamark Services, Inc. | Data card that can be used for transactions involving separate card issuers |
US5826243A (en) | 1994-01-03 | 1998-10-20 | Merrill Lynch & Co., Inc. | Integrated system for controlling master account and nested subaccount(s) |
CA2182596C (en) | 1994-02-04 | 2004-04-20 | James E. Biorge | Method and system for allocating and redeeming incentive credits between a portable device and a base device |
US5461217A (en) | 1994-02-08 | 1995-10-24 | At&T Ipm Corp. | Secure money transfer techniques using smart cards |
US5521363A (en) | 1994-02-16 | 1996-05-28 | Tannenbaum; David H. | System and method for tracking memory card transactions |
US5917925A (en) | 1994-04-14 | 1999-06-29 | Moore; Lewis J. | System for dispensing, verifying and tracking postage and other information on mailpieces |
US5799087A (en) | 1994-04-28 | 1998-08-25 | Citibank, N.A. | Electronic-monetary system |
FR2720848B1 (en) | 1994-06-03 | 1996-07-26 | Gemplus Card Int | Method of conducting a transaction between a smart card and an information system. |
US5577121A (en) | 1994-06-09 | 1996-11-19 | Electronic Payment Services, Inc. | Transaction system for integrated circuit cards |
US6925439B1 (en) | 1994-06-20 | 2005-08-02 | C-Sam, Inc. | Device, system and methods of conducting paperless transactions |
US5590038A (en) | 1994-06-20 | 1996-12-31 | Pitroda; Satyan G. | Universal electronic transaction card including receipt storage and system and methods of conducting electronic transactions |
US5875432A (en) | 1994-08-05 | 1999-02-23 | Sehr; Richard Peter | Computerized voting information system having predefined content and voting templates |
US6091835A (en) | 1994-08-31 | 2000-07-18 | Penop Limited | Method and system for transcribing electronic affirmations |
US5826241A (en) | 1994-09-16 | 1998-10-20 | First Virtual Holdings Incorporated | Computerized system for making payments and authenticating transactions over the internet |
US5559887A (en) | 1994-09-30 | 1996-09-24 | Electronic Payment Service | Collection of value from stored value systems |
US6045956A (en) | 1994-10-18 | 2000-04-04 | Fuji Photo Film Co., Ltd. | Method of forming color image |
US6154879A (en) | 1994-11-28 | 2000-11-28 | Smarttouch, Inc. | Tokenless biometric ATM access system |
US5764789A (en) | 1994-11-28 | 1998-06-09 | Smarttouch, Llc | Tokenless biometric ATM access system |
US6269348B1 (en) | 1994-11-28 | 2001-07-31 | Veristar Corporation | Tokenless biometric electronic debit and credit transactions |
US6012039A (en) | 1994-11-28 | 2000-01-04 | Smarttouch, Inc. | Tokenless biometric electronic rewards system |
US5513272A (en) | 1994-12-05 | 1996-04-30 | Wizards, Llc | System for verifying use of a credit/identification card including recording of physical attributes of unauthorized users |
US5857079A (en) | 1994-12-23 | 1999-01-05 | Lucent Technologies Inc. | Smart card for automatic financial records |
US5835894A (en) | 1995-01-19 | 1998-11-10 | Ann Adcock Corporation | Speaker and command verification method |
US5604801A (en) | 1995-02-03 | 1997-02-18 | International Business Machines Corporation | Public key data communications system under control of a portable security device |
AU4926396A (en) | 1995-02-16 | 1996-09-04 | Micromodule Systems, Inc. | Multiple chip module mounting assembly and computer using same |
US5559317A (en) | 1995-03-27 | 1996-09-24 | International Verifact Inc. | Card reader with carriage powered by movement of inserted card |
US5679945A (en) | 1995-03-31 | 1997-10-21 | Cybermark, L.L.C. | Intelligent card reader having emulation features |
US5590197A (en) | 1995-04-04 | 1996-12-31 | V-One Corporation | Electronic payment system and method |
US6424249B1 (en) | 1995-05-08 | 2002-07-23 | Image Data, Llc | Positive identity verification system and method including biometric user authentication |
US5942761A (en) | 1995-06-07 | 1999-08-24 | Tuli; Raja Singh | Enhancement methods and devices for reading a fingerprint image |
US5742845A (en) | 1995-06-22 | 1998-04-21 | Datascape, Inc. | System for extending present open network communication protocols to communicate with non-standard I/O devices directly coupled to an open network |
US5790677A (en) | 1995-06-29 | 1998-08-04 | Microsoft Corporation | System and method for secure electronic commerce transactions |
JP2776409B2 (en) | 1995-08-02 | 1998-07-16 | 日本電気株式会社 | Classification device for skin pattern and fingerprint pattern |
US5815252A (en) | 1995-09-05 | 1998-09-29 | Canon Kabushiki Kaisha | Biometric identification process and system utilizing multiple parameters scans for reduction of false negatives |
US5721781A (en) | 1995-09-13 | 1998-02-24 | Microsoft Corporation | Authentication system and method for smart card transactions |
US5663553A (en) | 1995-09-27 | 1997-09-02 | Intel Corporation | Mass storage device adapter for smart cards |
US5757917A (en) | 1995-11-01 | 1998-05-26 | First Virtual Holdings Incorporated | Computerized payment system for purchasing goods and services on the internet |
US5796832A (en) | 1995-11-13 | 1998-08-18 | Transaction Technology, Inc. | Wireless transaction and information system |
US5602918A (en) | 1995-12-22 | 1997-02-11 | Virtual Open Network Environment Corp. | Application level security system and method |
US5613001A (en) | 1996-01-16 | 1997-03-18 | Bakhoum; Ezzat G. | Digital signature verification technology for smart credit card and internet applications |
US5742756A (en) | 1996-02-12 | 1998-04-21 | Microsoft Corporation | System and method of using smart cards to perform security-critical operations requiring user authorization |
US5889941A (en) | 1996-04-15 | 1999-03-30 | Ubiq Inc. | System and apparatus for smart card personalization |
US5815657A (en) | 1996-04-26 | 1998-09-29 | Verifone, Inc. | System, method and article of manufacture for network electronic authorization utilizing an authorization instrument |
US5739512A (en) | 1996-05-30 | 1998-04-14 | Sun Microsystems, Inc. | Digital delivery of receipts |
US5988497A (en) | 1996-05-30 | 1999-11-23 | Mci Communications Corporation | Method for authenticating credit transactions to prevent fraudulent charges |
US5778173A (en) | 1996-06-12 | 1998-07-07 | At&T Corp. | Mechanism for enabling secure electronic transactions on the open internet |
US5978495A (en) | 1996-07-17 | 1999-11-02 | Intelnet Inc. | Method and apparatus for accurate determination of the identity of human beings |
US5907620A (en) | 1996-08-23 | 1999-05-25 | Cheyenne Property Trust | Method and apparatus for enforcing the use of cryptography in an international cryptography framework |
US6104311A (en) | 1996-08-26 | 2000-08-15 | Addison Technologies | Information storage and identification tag |
NO963903D0 (en) | 1996-09-18 | 1996-09-18 | Gary A Mcconnell | Method of registering validation of a personal signature, compilation of databases for use in the method, an electronic writing device for signature registration and the use of methods and devices |
KR100451783B1 (en) | 1996-09-13 | 2004-10-08 | 오끼 덴끼 고오교 가부시끼가이샤 | Electronic transaction system |
US5930767A (en) | 1997-05-28 | 1999-07-27 | Motorola, Inc. | Transaction methods systems and devices |
US5931917A (en) | 1996-09-26 | 1999-08-03 | Verifone, Inc. | System, method and article of manufacture for a gateway system architecture with system administration information accessible from a browser |
US5869822A (en) | 1996-10-04 | 1999-02-09 | Meadows, Ii; Dexter L. | Automated fingerprint identification system |
US5991411A (en) | 1996-10-08 | 1999-11-23 | International Business Machines Corporation | Method and means for limiting adverse use of counterfeit credit cards, access badges, electronic accounts or the like |
US5920058A (en) | 1996-10-23 | 1999-07-06 | Weber; David C. | Holographic labeling and reading machine for authentication and security applications |
US5737439A (en) | 1996-10-29 | 1998-04-07 | Smarttouch, Llc. | Anti-fraud biometric scanner that accurately detects blood flow |
US6268788B1 (en) | 1996-11-07 | 2001-07-31 | Litronic Inc. | Apparatus and method for providing an authentication system based on biometrics |
US5917913A (en) | 1996-12-04 | 1999-06-29 | Wang; Ynjiun Paul | Portable electronic authorization devices and methods therefor |
US6130623A (en) | 1996-12-31 | 2000-10-10 | Lucent Technologies Inc. | Encryption for modulated backscatter systems |
IL119955A0 (en) | 1997-01-01 | 1997-04-15 | Advanced Recognition Tech | An instruction and/or identification input unit |
CN1291324A (en) | 1997-01-31 | 2001-04-11 | T-内提克斯公司 | System and method for detecting a recorded voice |
US5915973A (en) | 1997-03-11 | 1999-06-29 | Sylvan Learning Systems, Inc. | System for administration of remotely-proctored, secure examinations and methods therefor |
US6901154B2 (en) | 1997-04-16 | 2005-05-31 | Activcard Ireland Limited | Method of detecting authorised biometric information sensor |
US6012636A (en) | 1997-04-22 | 2000-01-11 | Smith; Frank E. | Multiple card data system having first and second memory elements including magnetic strip and fingerprints scanning means |
US6018739A (en) | 1997-05-15 | 2000-01-25 | Raytheon Company | Biometric personnel identification system |
US5838818A (en) | 1997-06-18 | 1998-11-17 | Hewlett-Packard Company | Artifact reduction compression method and apparatus for mosaiced images |
JPH1139483A (en) | 1997-07-16 | 1999-02-12 | Nippon Telegr & Teleph Corp <Ntt> | Fingerprint authentication card, memory card, authentication system, authentication device and portable equipment |
US6016476A (en) | 1997-08-11 | 2000-01-18 | International Business Machines Corporation | Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security |
US6060815A (en) | 1997-08-18 | 2000-05-09 | X-Cyte, Inc. | Frequency mixing passive transponder |
GB2329497B (en) | 1997-09-19 | 2001-01-31 | Ibm | Method for controlling access to electronically provided services and system for implementing such method |
US6233348B1 (en) | 1997-10-20 | 2001-05-15 | Fujitsu Limited | Fingerprint registering apparatus, fingerprint identifying apparatus, and fingerprint identifying method |
US5987155A (en) | 1997-10-27 | 1999-11-16 | Dew Engineering And Development Limited | Biometric input device with peripheral port |
US6095413A (en) | 1997-11-17 | 2000-08-01 | Automated Transaction Corporation | System and method for enhanced fraud detection in automated electronic credit card processing |
DE19751172C2 (en) | 1997-11-19 | 2003-08-14 | Orga Kartensysteme Gmbh | Device for processing fingerprint data |
WO1999027489A1 (en) | 1997-11-20 | 1999-06-03 | Quo Technologies, L.L.C. | Method and system for biometric recognition using unique internal distinguishing characteristics |
JP2950307B2 (en) | 1997-11-28 | 1999-09-20 | 日本電気株式会社 | Personal authentication device and personal authentication method |
US6070159A (en) | 1997-12-05 | 2000-05-30 | Authentec, Inc. | Method and apparatus for expandable biometric searching |
US6047281A (en) | 1997-12-05 | 2000-04-04 | Authentec, Inc. | Method and apparatus for expandable biometric searching |
US6047282A (en) | 1997-12-05 | 2000-04-04 | Authentec, Inc. | Apparatus and method for expandable biometric searching |
US6041410A (en) | 1997-12-22 | 2000-03-21 | Trw Inc. | Personal identification fob |
US6263446B1 (en) | 1997-12-23 | 2001-07-17 | Arcot Systems, Inc. | Method and apparatus for secure distribution of authentication credentials to roaming users |
US5995014A (en) | 1997-12-30 | 1999-11-30 | Accu-Time Systems, Inc. | Biometric interface device for upgrading existing access control units |
US6101477A (en) | 1998-01-23 | 2000-08-08 | American Express Travel Related Services Company, Inc. | Methods and apparatus for a travel-related multi-function smartcard |
US6104922A (en) | 1998-03-02 | 2000-08-15 | Motorola, Inc. | User authentication in a communication system utilizing biometric information |
US6199079B1 (en) | 1998-03-09 | 2001-03-06 | Junglee Corporation | Method and system for automatically filling forms in an integrated network based transaction environment |
US7171662B1 (en) | 1998-03-18 | 2007-01-30 | Microsoft Corporation | System and method for software licensing |
US6182892B1 (en) | 1998-03-25 | 2001-02-06 | Compaq Computer Corporation | Smart card with fingerprint image pass-through |
US6609656B1 (en) | 1998-03-27 | 2003-08-26 | Micron Technology, Inc. | Method and system for identifying lost or stolen devices |
US6307956B1 (en) | 1998-04-07 | 2001-10-23 | Gerald R. Black | Writing implement for identity verification system |
US6539101B1 (en) | 1998-04-07 | 2003-03-25 | Gerald R. Black | Method for identity verification |
US6178255B1 (en) | 1998-04-28 | 2001-01-23 | Cross Match Technologies, Inc. | Individualized fingerprint scanner |
US6219639B1 (en) | 1998-04-28 | 2001-04-17 | International Business Machines Corporation | Method and apparatus for recognizing identity of individuals employing synchronized biometrics |
US6199762B1 (en) | 1998-05-06 | 2001-03-13 | American Express Travel Related Services Co., Inc. | Methods and apparatus for dynamic smartcard synchronization and personalization |
US6655585B2 (en) | 1998-05-11 | 2003-12-02 | Citicorp Development Center, Inc. | System and method of biometric smart card user authentication |
US6270011B1 (en) | 1998-05-28 | 2001-08-07 | Benenson Tal | Remote credit card authentication system |
US6360953B1 (en) | 1998-07-15 | 2002-03-26 | Magnex Corporation | Secure print sensing smart card with on-the-fly-operation |
US6357663B1 (en) | 1998-07-30 | 2002-03-19 | Fujitsu Takamisawa Component Limited | Fingerprint identifying PC card |
US6870946B1 (en) | 1998-08-06 | 2005-03-22 | Secugen Corporation | Compact optical fingerprint capturing and recognition system |
US6507662B1 (en) | 1998-09-11 | 2003-01-14 | Quid Technologies Llc | Method and system for biometric recognition based on electric and/or magnetic properties |
DE69938929D1 (en) | 1998-09-11 | 2008-07-31 | Motorola Inc | RFID LABELING DEVICE AND METHOD |
JP2000123144A (en) | 1998-10-13 | 2000-04-28 | Sony Corp | Contactless ic card |
US6496594B1 (en) | 1998-10-22 | 2002-12-17 | Francine J. Prokoski | Method and apparatus for aligning and comparing images of the face and body from different imagers |
US6631201B1 (en) | 1998-11-06 | 2003-10-07 | Security First Corporation | Relief object sensor adaptor |
US6519565B1 (en) | 1998-11-10 | 2003-02-11 | Voice Security Systems, Inc. | Method of comparing utterances for security control |
US6381347B1 (en) | 1998-11-12 | 2002-04-30 | Secugen | High contrast, low distortion optical acquistion system for image capturing |
US6095519A (en) | 1998-11-17 | 2000-08-01 | Shoemaker, Jr.; Stephen P. | Arcade game gamepiece guide with flexible portion |
US6257486B1 (en) | 1998-11-23 | 2001-07-10 | Cardis Research & Development Ltd. | Smart card pin system, card, and reader |
US6442286B1 (en) | 1998-12-22 | 2002-08-27 | Stmicroelectronics, Inc. | High security flash memory and method |
US6327578B1 (en) | 1998-12-29 | 2001-12-04 | International Business Machines Corporation | Four-party credit/debit payment protocol |
US6338435B1 (en) | 1999-01-15 | 2002-01-15 | Todd Carper | Smart card patch manager |
US6256690B1 (en) | 1999-01-15 | 2001-07-03 | Todd Carper | System and method for facilitating multiple applications on a smart card |
US6480935B1 (en) | 1999-01-15 | 2002-11-12 | Todd Carper | Smart card memory management system and method |
US6390374B1 (en) | 1999-01-15 | 2002-05-21 | Todd Carper | System and method for installing/de-installing an application on a smart card |
US6332193B1 (en) | 1999-01-18 | 2001-12-18 | Sensar, Inc. | Method and apparatus for securely transmitting and authenticating biometric data over a network |
US6175656B1 (en) | 1999-03-25 | 2001-01-16 | Sony Corporation | Non-linear video sharpening filter |
JP3817965B2 (en) | 1999-04-21 | 2006-09-06 | 富士ゼロックス株式会社 | Detection device |
US6116736A (en) | 1999-04-23 | 2000-09-12 | Neuroptics, Inc. | Pupilometer with pupil irregularity detection capability |
US6615191B1 (en) | 1999-05-11 | 2003-09-02 | E. Addison Seeley | Software licensing and distribution systems and methods employing biometric sample authentication |
US6272562B1 (en) | 1999-05-28 | 2001-08-07 | Cross Match Technologies, Inc. | Access control unit interface |
US6697947B1 (en) | 1999-06-17 | 2004-02-24 | International Business Machines Corporation | Biometric based multi-party authentication |
US6886104B1 (en) | 1999-06-25 | 2005-04-26 | Cross Match Technologies | Rechargeable mobile hand-held fingerprint scanner with a data and power communication interface |
US6744910B1 (en) | 1999-06-25 | 2004-06-01 | Cross Match Technologies, Inc. | Hand-held fingerprint scanner with on-board image normalization data storage |
US7127088B1 (en) | 1999-07-19 | 2006-10-24 | Mandylion Research Labs, Llc | Method of authenticating proper access to secured site and device for implementation thereof |
US6446862B1 (en) | 1999-12-31 | 2002-09-10 | W. Stephen G. Mann | Point of purchase (PoP) terminal |
DE19936097A1 (en) | 1999-07-30 | 2001-02-08 | Giesecke & Devrient Gmbh | Method, device and system for biometric authentication of a person |
US6275353B1 (en) | 1999-08-03 | 2001-08-14 | Seagate Technology Llc | Housing for a disc drive having cantilevered base slot to reduce mechanical shock damage |
US6609198B1 (en) | 1999-08-05 | 2003-08-19 | Sun Microsystems, Inc. | Log-on service providing credential level change without loss of session continuity |
US6719200B1 (en) | 1999-08-06 | 2004-04-13 | Precise Biometrics Ab | Checking of right to access |
US6658164B1 (en) | 1999-08-09 | 2003-12-02 | Cross Match Technologies, Inc. | Calibration and correction in a fingerprint scanner |
EP1208523A1 (en) | 1999-08-09 | 2002-05-29 | Cross Match Technologies, Inc. | System and method for sending a packet with position address and line scan data over an interface cable |
US7162060B1 (en) | 1999-08-09 | 2007-01-09 | Cross Match Technologies | Method, system, and computer program product for control of platen movement during a live scan |
US6120461A (en) | 1999-08-09 | 2000-09-19 | The United States Of America As Represented By The Secretary Of The Army | Apparatus for tracking the human eye with a retinal scanning display, and method thereof |
US6873974B1 (en) | 1999-08-17 | 2005-03-29 | Citibank, N.A. | System and method for use of distributed electronic wallets |
US6483932B1 (en) | 1999-08-19 | 2002-11-19 | Cross Match Technologies, Inc. | Method and apparatus for rolled fingerprint capture |
US6744909B1 (en) | 1999-08-19 | 2004-06-01 | Physical Optics Corporation | Authentication system and method |
WO2001016707A1 (en) | 1999-08-31 | 2001-03-08 | Cryptec Systems, Inc. | Smart card operating system with interfaces |
WO2001016874A1 (en) | 1999-08-31 | 2001-03-08 | Cryptec Systems, Inc. | Smart card transaction manager |
WO2001016873A1 (en) | 1999-08-31 | 2001-03-08 | Cryptec Systems, Inc. | Smart card patch manager |
WO2001016759A1 (en) | 1999-08-31 | 2001-03-08 | Cryptec Systems, Inc. | Smart card memory management system and method |
WO2001016865A1 (en) | 1999-08-31 | 2001-03-08 | Cryptec Systems, Inc. | System and method for installing/de-installing an application on a smart card |
US6490443B1 (en) | 1999-09-02 | 2002-12-03 | Automated Business Companies | Communication and proximity authorization systems |
US6925565B2 (en) | 2001-05-25 | 2005-08-02 | Pen-One, Inc | Pen-based transponder identity verification system |
JP2001092786A (en) | 1999-09-24 | 2001-04-06 | Mizobe Tatsuji | Portable personal identification device and electronic system to which access is permitted by the same device |
US6681328B1 (en) | 1999-10-08 | 2004-01-20 | Mastercard International Incorporated | System and method for global internet digital identification |
WO2001031564A1 (en) | 1999-10-22 | 2001-05-03 | Cross Match Technologies, Inc. | Adjustable, rotatable finger guide in a tenprint scanner with movable prism platen |
US6325285B1 (en) | 1999-11-12 | 2001-12-04 | At&T Corp. | Smart card with integrated fingerprint reader |
JP2001167054A (en) | 1999-12-09 | 2001-06-22 | Casio Comput Co Ltd | Portable information equipment, device and system for authentication |
US7239227B1 (en) | 1999-12-30 | 2007-07-03 | Upek, Inc. | Command interface using fingerprint sensor input system |
DE10001929A1 (en) | 2000-01-19 | 2001-08-09 | Skidata Ag | Authorization control facility |
WO2001056213A1 (en) | 2000-01-26 | 2001-08-02 | Citicorp Development Center, Inc. | System and method for user authentication |
US6588673B1 (en) | 2000-02-08 | 2003-07-08 | Mist Inc. | Method and system providing in-line pre-production data preparation and personalization solutions for smart cards |
US6257620B1 (en) | 2000-02-23 | 2001-07-10 | Bernard Carroll Kenney | High efficiency ski for sailing on snow or ice |
JP2001236324A (en) | 2000-02-24 | 2001-08-31 | Fujitsu Ltd | Portable electronic device with individual authenticating function by biometric information |
US6591249B2 (en) | 2000-03-26 | 2003-07-08 | Ron Zoka | Touch scan internet credit card verification purchase process |
AU757159C (en) | 2000-05-16 | 2003-07-03 | Mu Hua Investments Limited | Biometric key |
US6483929B1 (en) | 2000-06-08 | 2002-11-19 | Tarian Llc | Method and apparatus for histological and physiological biometric operation and authentication |
WO2001098329A1 (en) | 2000-06-22 | 2001-12-27 | Theravance, Inc. | Polyhydroxy glycopeptide derivatives |
US7049962B2 (en) | 2000-07-28 | 2006-05-23 | Micoh Corporation | Materials and construction for a tamper indicating radio frequency identification label |
US7289649B1 (en) | 2000-08-10 | 2007-10-30 | Avago Technologies Ecbu Ip (Singapore) Pte. Ltd. | Fingerprint imager |
EP1312040B1 (en) | 2000-08-18 | 2006-04-05 | Cross Match Technologies, Inc. | Fingerprint scanner auto-capture system and method |
US6588660B1 (en) | 2000-09-29 | 2003-07-08 | Hewlett-Packard Development Company, L.P. | Passive contactless smartcard security system |
US6601759B2 (en) | 2000-10-04 | 2003-08-05 | American Express Travel Related Services | System and method for providing feedback in an interactive payment system |
US6819219B1 (en) | 2000-10-13 | 2004-11-16 | International Business Machines Corporation | Method for biometric-based authentication in wireless communication for access control |
US8103881B2 (en) * | 2000-11-06 | 2012-01-24 | Innovation Connection Corporation | System, method and apparatus for electronic ticketing |
US7218202B2 (en) | 2000-11-16 | 2007-05-15 | Mu Hua Investment Limited | Biometric key |
JP2002183706A (en) | 2000-12-18 | 2002-06-28 | Gaia:Kk | Card information protecting method |
US6928195B2 (en) | 2000-12-18 | 2005-08-09 | Cross Match Technologies, Inc. | Palm scanner using a programmable nutating mirror for increased resolution |
US7921297B2 (en) | 2001-01-10 | 2011-04-05 | Luis Melisendro Ortiz | Random biometric authentication utilizing unique biometric signatures |
US6629591B1 (en) | 2001-01-12 | 2003-10-07 | Igt | Smart token |
US20020095587A1 (en) | 2001-01-17 | 2002-07-18 | International Business Machines Corporation | Smart card with integrated biometric sensor |
US6968453B2 (en) * | 2001-01-17 | 2005-11-22 | International Business Machines Corporation | Secure integrated device with secure, dynamically-selectable capabilities |
US7057511B2 (en) | 2001-02-12 | 2006-06-06 | Symbol Technologies, Inc. | Method, system, and apparatus for communicating with a RFID tag population |
US6970582B2 (en) | 2001-03-06 | 2005-11-29 | Northrop Grumman Corporation | Method and system for identity verification using multiple simultaneously scanned biometric images |
JP3637566B2 (en) | 2001-03-21 | 2005-04-13 | 安田金属工業株式会社 | Authentication method using payment history information |
US6877097B2 (en) | 2001-03-21 | 2005-04-05 | Activcard, Inc. | Security access method and apparatus |
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
US6914517B2 (en) | 2001-04-17 | 2005-07-05 | Dalton Patrick Enterprises, Inc. | Fingerprint sensor with feature authentication |
US20020153424A1 (en) | 2001-04-19 | 2002-10-24 | Chuan Li | Method and apparatus of secure credit card transaction |
AU2002305229A1 (en) | 2001-04-26 | 2002-11-11 | Cross Match Technologies, Inc. | Silicone rubber surfaces for biometric print tir prisms |
US6816058B2 (en) | 2001-04-26 | 2004-11-09 | Mcgregor Christopher M | Bio-metric smart card, bio-metric smart card reader and method of use |
AU784438B2 (en) | 2001-05-09 | 2006-04-06 | Mondami Pty Ltd | Security access enclosure |
AUPR488101A0 (en) | 2001-05-09 | 2001-05-31 | Mondami Pty Ltd | Security access enclosure |
US6601762B2 (en) | 2001-06-15 | 2003-08-05 | Koninklijke Philips Electronics N.V. | Point-of-sale (POS) voice authentication transaction system |
US6834795B1 (en) | 2001-06-29 | 2004-12-28 | Sun Microsystems, Inc. | Secure user authentication to computing resource via smart card |
US7270265B2 (en) | 2001-07-06 | 2007-09-18 | France Telecom | Process for managing an electronic transaction by chip card terminal and chip card implementing this process |
US7059531B2 (en) | 2001-07-10 | 2006-06-13 | American Express Travel Related Services Company, Inc. | Method and system for smellprint recognition biometrics on a fob |
US7303120B2 (en) | 2001-07-10 | 2007-12-04 | American Express Travel Related Services Company, Inc. | System for biometric security using a FOB |
US6669086B2 (en) | 2001-07-23 | 2003-12-30 | Faisal H. Abdi | Self service check cashing system and method |
US6945453B1 (en) | 2001-08-13 | 2005-09-20 | Bank One Delaware N.A. | System and method for funding a collective account by use of an electronic tag |
US8266451B2 (en) * | 2001-08-31 | 2012-09-11 | Gemalto Sa | Voice activated smart card |
KR100432490B1 (en) | 2001-09-17 | 2004-05-22 | (주)니트 젠 | Optical fingerprint acquisition apparatus |
US6828960B2 (en) | 2001-09-28 | 2004-12-07 | Hewlett-Packard Development Company, L.P. | Electronic writing instrument with fingerprint scanner |
US6934861B2 (en) | 2001-11-06 | 2005-08-23 | Crosscheck Identification Systems International, Inc. | National identification card system and biometric identity verification method for negotiating transactions |
KR20030042639A (en) | 2001-11-23 | 2003-06-02 | (주)코아게이트 | Multi-certification system and the method using smart card |
US6734887B2 (en) | 2001-12-11 | 2004-05-11 | Zih Corp. | Process for printing a metallic security feature on identification cards and cards produced therefrom |
US6929413B2 (en) | 2001-12-11 | 2005-08-16 | Zebra Atlantek, Inc. | Printer driver log security verification for identification cards |
US6988665B2 (en) | 2001-12-11 | 2006-01-24 | Zebra Atlantek, Inc. | Grayscale security microprinting for identification cards |
US7506172B2 (en) | 2002-01-07 | 2009-03-17 | Igt | Gaming device with biometric system |
WO2003063054A2 (en) | 2002-01-17 | 2003-07-31 | Cross Match Technologies, Inc. | Fingerprint workstation and methods |
US6867850B2 (en) | 2002-01-17 | 2005-03-15 | Cross Match Technologies, Inc. | Light wedge for illuminating a platen in a print scanner |
US6954260B2 (en) | 2002-01-17 | 2005-10-11 | Cross Match Technologies, Inc. | Systems and methods for illuminating a platen in a print scanner |
US6732919B2 (en) | 2002-02-19 | 2004-05-11 | Hewlett-Packard Development Company, L.P. | System and method for using a multiple-use credit card |
US7266848B2 (en) | 2002-03-18 | 2007-09-04 | Freescale Semiconductor, Inc. | Integrated circuit security and method therefor |
US8082575B2 (en) * | 2002-03-28 | 2011-12-20 | Rampart-Id Systems, Inc. | System, method and apparatus for enabling transactions using a user enabled programmable magnetic stripe |
US7079007B2 (en) | 2002-04-19 | 2006-07-18 | Cross Match Technologies, Inc. | Systems and methods utilizing biometric data |
US7073711B2 (en) | 2002-04-19 | 2006-07-11 | Cross Match Technologies, Inc. | Mobile handheld code reader and print scanner system and method |
US6944768B2 (en) | 2002-04-19 | 2005-09-13 | Cross Match Technologies, Inc. | System and methods for access control utilizing two factors to control access |
NL1020903C2 (en) | 2002-06-19 | 2003-12-22 | Enschede Sdu Bv | System and method for automatically verifying the holder of an authorization document and automatically determining the authenticity and validity of the authorization document. |
US20060032905A1 (en) * | 2002-06-19 | 2006-02-16 | Alon Bear | Smart card network interface device |
JP4174244B2 (en) | 2002-06-20 | 2008-10-29 | キヤノン株式会社 | Image capturing apparatus and control method thereof |
US7543156B2 (en) * | 2002-06-25 | 2009-06-02 | Resilent, Llc | Transaction authentication card |
US6996259B2 (en) | 2002-08-02 | 2006-02-07 | Cross Match Technologies, Inc. | System and method for counting ridges in a captured print image |
JP3815400B2 (en) | 2002-08-08 | 2006-08-30 | ソニー株式会社 | Adapter device |
US7574734B2 (en) | 2002-08-15 | 2009-08-11 | Dominique Louis Joseph Fedronic | System and method for sequentially processing a biometric sample |
US20040039909A1 (en) | 2002-08-22 | 2004-02-26 | David Cheng | Flexible authentication with multiple levels and factors |
JPWO2004023390A1 (en) * | 2002-08-30 | 2006-01-05 | 富士通株式会社 | Electronic storage device, authentication device, and authentication method |
CZ2005209A3 (en) | 2002-09-10 | 2005-12-14 | Ivi Smart Technologies, Inc. | Safe biometric verification of identity |
KR100899199B1 (en) | 2002-11-05 | 2009-05-27 | 삼성전자주식회사 | security system and security method using fingerprint |
US7155039B1 (en) | 2002-12-18 | 2006-12-26 | Motorola, Inc. | Automatic fingerprint identification system and method |
US6776332B2 (en) | 2002-12-26 | 2004-08-17 | Micropin Technologies Inc. | System and method for validating and operating an access card |
US8266005B2 (en) * | 2003-01-17 | 2012-09-11 | Uniloc Luxembourg | Automated pricing system |
US7059159B2 (en) | 2003-02-06 | 2006-06-13 | Mi-Jack Products, Inc. | Security system for cargo trailers |
US7164440B2 (en) | 2003-02-28 | 2007-01-16 | Cross Match Technologies, Inc. | Dynamic image adaptation method for adjusting the quality of digital prints |
US6983882B2 (en) * | 2003-03-31 | 2006-01-10 | Kepler, Ltd. | Personal biometric authentication and authorization device |
EP1467512B1 (en) | 2003-04-07 | 2008-07-23 | STMicroelectronics S.r.l. | Encryption process employing chaotic maps and digital signature process |
RU2005138121A (en) * | 2003-06-16 | 2007-07-27 | Ю-Ар-Ю Тэкнолоджи, Инкорпорейтед (Us) | SYSTEM AND METHOD FOR CREATING DEVICES WITH A UNIFIED SET OF ACCOUNTING INFORMATION ADAPTED TO PROCESSING BIOMETRIC DATA, AS WELL AS THE SYSTEM AND METHOD FOR APPLYING SUCH DEVICES |
US20080148059A1 (en) * | 2003-07-25 | 2008-06-19 | Shapiro Michael F | Universal, Biometric, Self-Authenticating Identity Computer Having Multiple Communication Ports |
US20050035200A1 (en) | 2003-08-11 | 2005-02-17 | Colin Hendrick | Secure smartcard sleeve |
US7762470B2 (en) * | 2003-11-17 | 2010-07-27 | Dpd Patent Trust Ltd. | RFID token with multiple interface controller |
JP4313171B2 (en) | 2003-12-09 | 2009-08-12 | 株式会社日立製作所 | Authentication control apparatus and authentication control method |
US7028893B2 (en) | 2003-12-17 | 2006-04-18 | Motorola, Inc. | Fingerprint based smartcard |
US6997381B2 (en) * | 2003-12-24 | 2006-02-14 | Michael Arnouse | Dual-sided smart card reader |
US20050139685A1 (en) | 2003-12-30 | 2005-06-30 | Douglas Kozlay | Design & method for manufacturing low-cost smartcards with embedded fingerprint authentication system modules |
KR101088420B1 (en) | 2004-02-13 | 2011-12-08 | 아이비아이 스마트 테크놀로지스 인코포레이티드 | Method and apparatus for cryptographically processing data |
JP2005242650A (en) | 2004-02-26 | 2005-09-08 | Seiko Epson Corp | Ic card case |
US7681232B2 (en) | 2004-03-08 | 2010-03-16 | Cardlab Aps | Credit card and a secured data activation system |
KR101152044B1 (en) | 2004-03-23 | 2012-06-08 | 제말토 에스에이 | Unit consisting of a micro-module and a reader which is equipped with short-range contactless means of communication |
US7132946B2 (en) | 2004-04-08 | 2006-11-07 | 3M Innovative Properties Company | Variable frequency radio frequency identification (RFID) tags |
US8918900B2 (en) | 2004-04-26 | 2014-12-23 | Ivi Holdings Ltd. | Smart card for passport, electronic passport, and method, system, and apparatus for authenticating person holding smart card or electronic passport |
JP2005326995A (en) | 2004-05-13 | 2005-11-24 | Hitachi Systems & Services Ltd | Principal confirmation method with card |
US7325724B2 (en) | 2004-07-01 | 2008-02-05 | American Express Travel Related Services Company, Inc. | Method for registering a biometric for use with a smartcard |
US7318550B2 (en) | 2004-07-01 | 2008-01-15 | American Express Travel Related Services Company, Inc. | Biometric safeguard method for use with a smartcard |
US7314164B2 (en) | 2004-07-01 | 2008-01-01 | American Express Travel Related Services Company, Inc. | System for biometric security using a smartcard |
US7314165B2 (en) | 2004-07-01 | 2008-01-01 | American Express Travel Related Services Company, Inc. | Method and system for smellprint recognition biometrics on a smartcard |
JP2006018761A (en) | 2004-07-05 | 2006-01-19 | Canon Inc | Image reader |
AU2004218720B2 (en) | 2004-10-13 | 2005-06-09 | Mu Hua Investments Limited | Biometric security assembly |
US20060113381A1 (en) | 2004-11-29 | 2006-06-01 | John Hochstein | Batteryless contact fingerprint-enabled smartcard that enables contactless capability |
FR2882878B1 (en) | 2005-03-07 | 2007-04-27 | Christophe Richard | DEVICE, METHOD AND SYSTEM FOR SECURITY FOR FINANCIAL TRANSACTIONS BASED ON THE IDENTIFICATION OF AN INDIVIDUAL THROUGH ITS BIOMETRIC PROFILE AND USING A MICROPROCESSOR CARD |
JP4922288B2 (en) | 2005-03-24 | 2012-04-25 | プリバリス,インコーポレイテッド | Biometric device with smart card function |
AU2005202405B2 (en) | 2005-06-01 | 2011-05-12 | Canon Information Systems Research Australia Pty Ltd | Management of physical security credentials at a multi-function device |
SI1913528T1 (en) | 2005-07-01 | 2013-11-29 | Fabrizio Borracci | Universal smart card |
US20070033150A1 (en) | 2005-08-08 | 2007-02-08 | Enenia Biometrics, Inc. | Biometric web payment system |
JP2007048118A (en) | 2005-08-11 | 2007-02-22 | Oki Electric Ind Co Ltd | Automatic teller machine and automatic transaction system |
US20070043594A1 (en) | 2005-08-17 | 2007-02-22 | Lavergne Ken J | National healthcare information/transaction network for interoperability: standardizing delivery of healthcare through biometric smart cards & biometric smart chip-based devices |
RU2008110177A (en) | 2005-08-18 | 2009-09-27 | АйВиАй СМАРТ ТЕКНОЛОДЖИЗ, ИНК. (US) | SYSTEM AND METHOD OF BIOMETRIC AUTHENTICATION |
US20070040017A1 (en) * | 2005-08-22 | 2007-02-22 | Douglas Kozlay | Wireless biometric cardholder apparatus, method, & system |
JP2007058649A (en) | 2005-08-25 | 2007-03-08 | Konica Minolta Business Technologies Inc | Personal identification system and method for controlling the same |
US20070073619A1 (en) | 2005-09-23 | 2007-03-29 | Smith Rebecca C | Biometric anti-fraud plastic card |
JP5031223B2 (en) | 2005-10-26 | 2012-09-19 | キヤノン株式会社 | Information processing apparatus, print control method, program, and storage medium |
WO2007064429A1 (en) | 2005-10-28 | 2007-06-07 | Ivi Smart Technologies, Inc. | Biometric sensor and sensor panel, method for detecting biometric pattern using the same, and method for manufacturing the same |
JP2007128323A (en) | 2005-11-04 | 2007-05-24 | Canon Inc | Information processor, authentication processing method and computer program |
AU2006311596A1 (en) | 2005-11-09 | 2007-05-18 | Electronic Plastics, Llc | Device providing a secure work environment and utilizing a virtual interface |
JP4372093B2 (en) | 2005-12-05 | 2009-11-25 | Necインフロンティア株式会社 | Authentication system and method using IC card and program thereof |
WO2007089503A2 (en) | 2006-01-26 | 2007-08-09 | Imprivata, Inc. | Systems and methods for multi-factor authentication |
WO2007092957A2 (en) * | 2006-02-09 | 2007-08-16 | Card Logistics Properties, Ltd. | Proximity locator system |
US7364071B2 (en) | 2006-02-21 | 2008-04-29 | David Benjamin Esplin | System and method for managing wireless point-of-sale transactions |
US7506821B2 (en) * | 2006-02-22 | 2009-03-24 | Research In Motion Limited | Adapter for contact and contactless smart cards |
EP2005398A1 (en) | 2006-03-27 | 2008-12-24 | Fabrizio Borracci | A method for making a secure personal card and its working process |
US7594603B2 (en) * | 2006-03-29 | 2009-09-29 | Stmicroelectronics, Inc. | System and method for sensing biometric and non-biometric smart card devices |
JP2007265321A (en) | 2006-03-30 | 2007-10-11 | Toppan Printing Co Ltd | Personal identification system and personal identification method |
US7464865B2 (en) * | 2006-04-28 | 2008-12-16 | Research In Motion Limited | System and method for managing multiple smart card sessions |
US8099603B2 (en) * | 2006-05-22 | 2012-01-17 | Corestreet, Ltd. | Secure ID checking |
WO2007143670A2 (en) | 2006-06-05 | 2007-12-13 | Ivi Smart Technologies, Inc. | Electronic card type media storage and player device |
WO2007146681A2 (en) | 2006-06-06 | 2007-12-21 | Ivi Smart Technologies, Inc. | Wireless media player device and system, and method for operating the same |
US20080040615A1 (en) | 2006-06-30 | 2008-02-14 | Electronic Plastics, Llc | Biometric embedded device |
US20080126260A1 (en) * | 2006-07-12 | 2008-05-29 | Cox Mark A | Point Of Sale Transaction Device With Magnetic Stripe Emulator And Biometric Authentication |
US8786033B2 (en) | 2006-09-01 | 2014-07-22 | IVI Holdings, Ltd. | Biometric sensor and sensor panel, method for detecting biometric pattern using the same, and method for manufacturing the same |
JP4848235B2 (en) | 2006-09-19 | 2011-12-28 | 株式会社リコー | Image processing apparatus, image processing method, program, and recording medium |
US20080097924A1 (en) | 2006-10-20 | 2008-04-24 | Electronic Plastics, Llc | Decentralized secure transaction system |
US8045956B2 (en) | 2007-01-05 | 2011-10-25 | Macronix International Co., Ltd. | System and method of managing contactless payment transactions using a mobile communication device as a stored value device |
US8123124B2 (en) | 2007-03-14 | 2012-02-28 | Efrain Salazar | Magnetic stripe card anti-fraud security system |
US8908934B2 (en) | 2007-03-14 | 2014-12-09 | Ivi Holdings Ltd. | Fingerprint recognition for low computing power applications |
US8393490B2 (en) | 2007-06-11 | 2013-03-12 | Eddy Bitton | Product container strainer |
US20090094123A1 (en) | 2007-10-03 | 2009-04-09 | Patrick Killian | Payment services provider methods in connection with personalized payments system |
US20100257359A1 (en) * | 2007-11-12 | 2010-10-07 | Mark Currie | Method of and apparatus for protecting private data entry within secure web sessions |
US8276816B2 (en) | 2007-12-14 | 2012-10-02 | Validity Sensors, Inc. | Smart card system with ergonomic fingerprint sensor and method of using |
JP5317542B2 (en) | 2008-06-12 | 2013-10-16 | キヤノン株式会社 | Information processing apparatus, control method, and program |
US20090322477A1 (en) | 2008-06-29 | 2009-12-31 | Victor Manuel Celorio | Self-Activated Secure Identification Document |
WO2010019961A2 (en) | 2008-08-15 | 2010-02-18 | Ivi Smart Technologies, Inc. | Rf power conversion circuits & methods, both for use in mobile devices |
US20100080425A1 (en) | 2008-09-29 | 2010-04-01 | Board of regents of the Nevada System of Higher Education, on Behalf of the University of | Minutiae-based template synthesis and matching |
US8095519B2 (en) | 2008-12-16 | 2012-01-10 | International Business Machines Corporation | Multifactor authentication with changing unique values |
WO2010077999A2 (en) | 2008-12-16 | 2010-07-08 | Ivi Smart Technologies, Inc. | Reinforced smart cards, components, & methods of making same |
US20100161488A1 (en) | 2008-12-22 | 2010-06-24 | Paul Michael Evans | Methods and systems for biometric verification |
US9536238B2 (en) * | 2008-12-31 | 2017-01-03 | Peter Garrett | Hand-held electronics device for aggregation of and management of personal electronic data |
US8253531B2 (en) | 2009-03-26 | 2012-08-28 | International Business Machines Corporation | On chip verification and consequent enablement of card OS operation in smart cards |
JP2010262586A (en) | 2009-05-11 | 2010-11-18 | Nitty-Gritty Inc | Memory device, memory device system, and method therefor |
EP2254077A1 (en) | 2009-05-19 | 2010-11-24 | Gemalto SA | Device for a conventional smart card allowing an electronic transaction via a network |
WO2010133496A1 (en) | 2009-05-22 | 2010-11-25 | Arcelik Anonim Sirketi | An electric motor having a permanent magnet rotor |
US8485442B2 (en) | 2009-07-02 | 2013-07-16 | Biometric Payment Solutions | Electronic transaction verification system with biometric authentication |
DE102009035966A1 (en) | 2009-08-04 | 2011-02-10 | Deutsche Telekom Ag | Method for coded input and control by means of fingerprint |
GB2473283B (en) | 2009-09-08 | 2016-02-17 | Canon Europa Nv | Apparatus for accessing a smart card |
FR2953619B1 (en) | 2009-12-03 | 2012-08-03 | Uint | ACTIVATION AND INDICATION OF RF FIELD ON A DEVICE COMPRISING A CHIP. |
US20110238540A1 (en) | 2010-03-26 | 2011-09-29 | Mastercard International, Inc. | Financial account management based on specified criteria |
KR20110114806A (en) | 2010-04-14 | 2011-10-20 | 한국전자통신연구원 | Apparatus and method for controling smart card comprised of multi sensor |
FR2959847B1 (en) | 2010-05-10 | 2012-05-11 | Uint | "PAYMENT CARD COMPRISING AN ELECTRONIC GAME CHIP" |
US8799167B2 (en) | 2010-07-13 | 2014-08-05 | Tec Solutions, Inc. | Biometric authentication system and biometric sensor configured for single user authentication |
AU2010224455B8 (en) | 2010-09-28 | 2011-05-26 | Mu Hua Investments Limited | Biometric key |
US8598981B2 (en) | 2011-02-18 | 2013-12-03 | Tore Etholm Idsøe | Key fob with protected biometric sensor |
US8816819B2 (en) | 2011-02-24 | 2014-08-26 | Moon J. Kim | Dynamic information radio-frequency identification (RFID) card with biometric capabilities |
JP5759243B2 (en) | 2011-04-20 | 2015-08-05 | キヤノン株式会社 | Information processing system, image processing apparatus, information processing apparatus, control method thereof, and program |
US8713660B2 (en) | 2011-05-16 | 2014-04-29 | Tec Solutions, Inc. | Authentication platform and related method of operation |
US20120313754A1 (en) * | 2011-06-13 | 2012-12-13 | X-Card Holdings, Llc | Biometric smart card reader |
US8490872B2 (en) | 2011-06-15 | 2013-07-23 | Moon J. Kim | Light-powered smart card for on-line transaction processing |
US8783578B2 (en) | 2011-06-22 | 2014-07-22 | Moon J. Kim | Dynamic display information card |
US8756680B2 (en) * | 2011-08-02 | 2014-06-17 | Corning Incorporated | Biometric-enabled smart card |
WO2013020230A1 (en) | 2011-08-05 | 2013-02-14 | M.I.S. Electronics Inc. | Card with integrated fingerprint authentication |
US8977569B2 (en) * | 2011-09-29 | 2015-03-10 | Raj Rao | System and method for providing smart electronic wallet and reconfigurable transaction card thereof |
US9390445B2 (en) | 2012-03-05 | 2016-07-12 | Visa International Service Association | Authentication using biometric technology through a consumer device |
WO2013183061A1 (en) | 2012-06-06 | 2013-12-12 | Mohan Sundaram | Intelligent payment card and method for making secure transactions using the payment card |
US20140046785A1 (en) | 2012-08-13 | 2014-02-13 | Vandester Jenkins | Credit/Debit Card Secure Processing Method and System |
GB2506591A (en) | 2012-09-28 | 2014-04-09 | Bell Identification Bv | Method of providing secure services using a mobile device |
JP5947227B2 (en) | 2013-01-08 | 2016-07-06 | 有限会社 バース | Condominium management system |
SG11201505845RA (en) * | 2013-01-29 | 2015-08-28 | Mary Grace | Smart card and smart card system with enhanced security features |
GB2517777B (en) | 2013-08-30 | 2015-08-05 | Cylon Global Technology Inc | Data encryption and smartcard storing encrypted data |
KR101934173B1 (en) | 2014-04-11 | 2018-12-31 | 닛산 지도우샤 가부시키가이샤 | Electrical device |
US20150379033A1 (en) | 2014-06-27 | 2015-12-31 | International Business Machines Corporation | Parallel matching of hierarchical records |
US20160191512A1 (en) | 2014-12-27 | 2016-06-30 | Mcafee, Inc. | Predictive user authentication |
US20170323130A1 (en) * | 2016-05-06 | 2017-11-09 | Qualcomm Incorporated | Bidirectional ultrasonic sensor system for biometric devices |
US9697388B1 (en) * | 2016-06-14 | 2017-07-04 | Bank Of America Corporation | Unfoldable OLED reader/displays for the visually-impaired |
-
2015
- 2015-01-14 US US14/596,572 patent/US9607189B2/en not_active Expired - Fee Related
-
2016
- 2016-01-14 CN CN201680011587.3A patent/CN107251057A/en active Pending
- 2016-01-14 EP EP16737125.1A patent/EP3245618A4/en not_active Withdrawn
- 2016-01-14 SG SG11201705778UA patent/SG11201705778UA/en unknown
- 2016-01-14 KR KR1020177022667A patent/KR20170106998A/en unknown
- 2016-01-14 WO PCT/IB2016/000020 patent/WO2016113626A1/en active Application Filing
-
2017
- 2017-02-16 US US15/435,210 patent/US9892292B2/en not_active Expired - Fee Related
-
2018
- 2018-01-04 US US15/862,546 patent/US10223555B2/en not_active Expired - Fee Related
-
2019
- 2019-03-04 US US16/292,134 patent/US20190205575A1/en not_active Abandoned
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022039867A1 (en) * | 2020-08-17 | 2022-02-24 | Mastercard International Incorporated | Card reader, smart card and method for processing a transaction |
Also Published As
Publication number | Publication date |
---|---|
EP3245618A1 (en) | 2017-11-22 |
US20180232546A1 (en) | 2018-08-16 |
CN107251057A (en) | 2017-10-13 |
US9607189B2 (en) | 2017-03-28 |
US10223555B2 (en) | 2019-03-05 |
EP3245618A4 (en) | 2018-09-26 |
SG11201705778UA (en) | 2017-08-30 |
KR20170106998A (en) | 2017-09-22 |
US9892292B2 (en) | 2018-02-13 |
US20190050610A9 (en) | 2019-02-14 |
WO2016113626A1 (en) | 2016-07-21 |
US20160203346A1 (en) | 2016-07-14 |
US20170161528A1 (en) | 2017-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10223555B2 (en) | Smart card systems comprising a card and a carrier | |
US9704312B2 (en) | Apparatus and methods for identity verification | |
CN107944332B (en) | Fingerprint identification card and method for operating a fingerprint identification card | |
US20180365689A1 (en) | Biometric Device Utilizing Finger Sequence for Authentication | |
US11824642B2 (en) | Systems and methods for provisioning biometric image templates to devices for use in user authentication | |
EP3471070A1 (en) | Configurable digital badge holder | |
EA020762B1 (en) | Contactless biometric authentication system and authentication method | |
JP5146872B2 (en) | Non-contact IC card, portable terminal device, activation control method, and activation control program | |
WO2023081621A1 (en) | Fingerprint-based credential entry | |
KR101103189B1 (en) | System and Method for Issueing Public Certificate of Attestation using USIM Information and Recording Medium | |
KR20170142983A (en) | Method for Providing Appointed Service by using Biometric Information | |
US20150178722A1 (en) | Temporary passcode generation for credit card transactions | |
KR101693271B1 (en) | Method for Providing Appointed Service by using Biometric Information | |
WO2010018469A1 (en) | Method and apparatus for access to telematic services in protected mode by means of a single electronic universal key, and corresponding electronic universal key | |
CN117280344A (en) | Method for controlling a smart card | |
EP3248129A1 (en) | Biometric device utilizing finger sequence for authentication | |
KR20160022979A (en) | System for Providing Medium Storing Typed Financial Service Based on Diversified Management of Bio-information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- INCOMPLETE APPLICATION (PRE-EXAMINATION) |