Enabling card and method and system using the enabling card in a POS

Information

  • Patent Grant
  • 11829977
  • Patent Number
    11,829,977
  • Date Filed
    Saturday, May 15, 2021
    2 years ago
  • Date Issued
    Tuesday, November 28, 2023
    5 months ago
Abstract
The invention relates to an enabling card as well as a system and method for completing a financial transaction in a P.O.S. terminal comprising: a processor carried by the enabling card for: establishing a connection with a mobile device; receiving secure information from a mobile device and generating a digital signal; a coil carried by the enabling card for generating a magnetic field in response to the digital signal to simulate the swipe of card in the P.O.S. terminal and complete the financial transaction.
Description
FIELD OF THE INVENTION

This invention relates to a payment device that is compatible with magnetic readers such as existing point of sale terminal P.O.S. that improves the level of transaction security. More particularly this invention relates to an enabling card and the method and system using the enabling card in a reader such as a P.O.S. where the enabling card is capable of gathering information such as a user's credit card information from a mobile device to complete a payment transaction while placed into a regular P.O.S. terminal.


BACKGROUND OF THE INVENTION

A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. The magnetic stripe, sometimes called swipe card or magstripe, is read by swiping past a magnetic reading head, such as a P.O.S.


Financial institutions provide a variety of cards, such as credit cards, debit cards and the like. Merchants also provide gift cards or the like. A vast majority of these cards have magnetic stripes and are known as magnetic cards. There are up to three tracks on magnetic cards known as tracks 1, 2, and 3. Track 3 is virtually unused by the major worldwide networks, and often isn't even physically present on the card by virtue of a narrower magnetic stripe. Point-of-sale card readers almost always read track 1, or track 2, and sometimes both, in case one track is unreadable. The minimum cardholder account information needed to complete a transaction is present on both tracks. Track 1 has a higher bit density, and is generally the only track that may contain alphabetic text, and hence is the only track that contains the cardholder's name.


Furthermore, many hotels and other institutions including office buildings generate security or access cards in order to allow authorized personal to enter their hotel rooms, institutions or office buildings. There is a general concern to provide only the authorized personal with the security passes.


There have been a variety of prior art devices and methods to improve the security of the above-mentioned cards and particularly financial institution cards. For example, security codes or PINs, such as a sequence of 4 numbers for example can be a required input into a P.O.S terminal before completing a transaction. However, this is not foolproof as security codes can be stolen. Moreover, in many cases and, in many jurisdictions, PINs are not used. Also, some cards have chips embedded into the cards or include RFID devices. One chip card technology relates to Europay, Master card, Visa known as EMV.


Other attempts to improve the security of financial transactions are shown in U.S. Pat. No. 8,645,213 which show methods and apparatus, including computer program products, for transactions associated with a mobile device. The method includes, in a merchant device linked to a server by a first network, sending a registration to the server, sending a transaction message to the server, receiving a unique identifier from the server in response to the transaction message, broadcasting the unique identifier, in response to the broadcasted unique identifier, receiving instructions in the server from a mobile application residing in a memory of a mobile device over a second network, processing a transaction in response to the instructions, and notifying the merchant device of the processed transaction.


Furthermore U.S. Pat. No. 8,348,159 shows a wireless financial transaction instrument, such as a card, that has a magnetic stripe, a display, and an on-board power supply, such as a battery, and is usable with a dual capture point of sale terminal. Information is received by such a terminal from the card wirelessly, and also from the magnetic stripe, and the data received contactlessly is preferably used to verify that read from the stripe. The display can display the account number on command, or to display a current balance, or amount of credit remaining, or any combination of these items of information.


Moreover U.S. Pat. No. 8,584,938 illustrate a wireless transaction medium having combined magnetic stripe and radio frequency communications.


Finally, U.S. Pat. No. 8,469,277 shows methods, systems, and computer program products for acquiring payment device data for wireless payment transactions. According to one method, a request from a wireless payment reader for standardized payment device data for effecting a wireless payment is received by a wireless smart payment device. Payment device data elements are assembled by the wireless smart payment device into the standardized payment device data. The standardized payment device data are sent by the wireless smart payment device to the wireless payment reader.


It is an object of this invention to provide an improved payment device and method and system to improve the security of payment using magnetic cards or tap and go cards or RFID devices.


SUMMARY OF THE INVENTION

This invention relates to an enabling card for completing a transaction in a reader comprising: a) a processor carried by the enabling card for: i) establishing a connection with a device; ii) receiving secure information from the device and generating a signal; b) structure carried by the enabling card for generating a magnetic field in response to the signal to simulate the swipe of card in the reader


This invention relates to an enabling card for completing a transaction in a reader comprising; a processor carried by the enabling card for: establishing a connection with a mobile device; receiving secure information from a the mobile device and generating a digital signal; a coil carried by the enabling card for generating a magnetic field in response to the digital signal to simulate the swipe of card in the reader and complete the financial transaction.


It is another aspect of the invention to provide a system for completing a financial transaction through a P.O.S. terminal comprising: a mobile phone having an app for containing encrypted credit card authorization information; an enabling card comprising: a CPU; a Bluetooth module for establishing a connection with the mobile phone app; and a coil so as to receive the encrypted credit card authorization information; wherein the CPU translates the encrypted credit card authorization information to generate a digital signal which communicates with the coil to generate a magnetic field to simulate the swipe of a regular credit card in the P.O.S terminal and complete the transaction.


Yet another aspect of this invention relates to a method of completing a financial transaction in a P.O.S. terminal comprising the steps of: inserting an enabling card into the P.O.S terminal, said enabling card lacking authorization information; establishing a wireless connection between the enabling card and a mobile phone application containing encrypted credit card authorization information; transferring the credit card authorization information from the mobile phone to the enabling card; generating a magnetic field in response to the credit card authorization information transferred the credit card so as to complete the transaction.


These and other objects and features of the invention will be described with reference to the following drawings.





BRIEF DESCRIPTION OF THE DRAWINGS

A detailed description of preferred embodiments is provided herein below by way of example only and with reference to the following drawings, in which:



FIG. 1 illustrates a typical financial card having a magnetic stripe.



FIG. 2 illustrates an example of a track on a magnetic swipe.



FIG. 3 schematically illustrates the method of using the enabling card in a P.O.S. terminal to gather credit card information from a mobile device to complete the transaction.



FIG. 4 is a top plan view of one embodiment of the enabling card.



FIG. 5 illustrates a flow chart representing one embodiment of the invention.



FIG. 6 is another representative drawing of the invention.



FIG. 7 illustrates a flow chart of the invention.



FIG. 8 illustrates another embodiment of the invention whereby the enabling card is within a phone case.



FIG. 9 illustrates another embodiment of the enabling card.



FIG. 10 is yet another embodiment of the invention whereby the enabling card is housed in a key chain design.



FIG. 11 is a top plan view of FIG. 10.



FIG. 12 is a bottom view of FIG. 10.



FIG. 13 is a side elevational view of FIG. 10.





DETAILED DESCRIPTION OF THE INVENTION


FIG. 1 illustrates a card 2 such as a credit card, debit card, gift card, hotel door card, security access card or the like. The financial card 2 has a magnetic strip 4 which is comprised of tracks 6. More specifically there can be a plurality of tracks 6a, 6b and/or 6c. As previously described, the tracks 6 contain information in a normal transaction to complete a sale in a P.O.S.


The magnetic strip 4 can by way of example contain the following sequence as shown in FIG. 2. The sequence shown in FIG. 2 starts with colon 8 and includes encrypted information 10 such as the identity of the card holder, credit limit and and/or vendor or financial institution identity 12. A credit card, gift card, hotel door card, or security card or the like also includes encrypted information on the magnetic strip 4 which can include the name of the holder of the card 2 as well as the financial institution, hotel, organization or office which has issued the card 2.


The invention to be described herein comprises in one embodiment moving the encrypted information or authorization 10 that normally resides in a card 2 to a mobile device 24 such as a mobile phone 24, or obtaining a one time encrypted authorization by the mobile phone 24 from a financial institution, vendor, hotel, organization, office or the like. In either case the enabling or authorization card 20 to be described herein gathers the: encrypted information; or one time encrypted authorization, from the mobile phone 24 to complete the transaction. The vital information 10, and 12 is resident in the mobile device 24, thus more secure that if the vital information 10 and 12 was resident on the card 2, or enabling card 20.


In the case where the enabling card 20 acts as a financial institution card 2, once the transaction is completed the enabling card 20 loses the encrypted information or one-time encrypted authorization—but the encrypted information resides within the mobile phone 24. In other words, there is separation of the encrypted information or one-time encrypted authorization from the card 2 to the mobile device 24 which communicates with the enabling card 20.


In the case of a hotel door card, organization, or office security card or the like the encrypted information would reside in the mobile phone 24. In other words, hotels or vendors could send the encrypted information (which could be time sensitive) ahead of time to the guest or on the spot; making it easier and more secure than heretofore. By time sensitive we mean that the hotel door security card does not work after the guest hotel stay expires.


Thus the invention described herein contemplates the use of one enabling card 20 that can be activated or deactivated by a financial institution, vendor, hotel, organization or office as the need arises; or the use of a plurality of enabling cards 20 that are activated or deactivated by a plurality of financial institutions, vendors, hotels, organizations, offices or the like as the need arises.



FIG. 3 schematically illustrates the method of using the card 20 in the P.O.S. terminal to gather credit card information from a mobile device 24 such as a phone or the like to complete the transaction.



FIG. 4 illustrates one embodiment of the invention which comprises the enabling card 20 having a charger circuit 26. The card 20 also includes a CPU or micro controller 30. Generally speaking, the micro controller 30 can communicate by Bluetooth technology, WiFi or the like. The enabling card 20 establishes a secure Bluetooth connection with the mobile device 24.


In one embodiment the CPU communicates by a Bluetooth technology which is generally more secure than WiFi. Generally speaking, WiFi technology is easier to intercept than that of Bluetooth. The enabling card 20 also can include a rechargeable battery 32 which can comprise a Li—Po battery or a miniature solar panel which is part of the enabling card 20 that can be charged by the sun or the like.


The enabling card 20 also includes a programmable port 34 and includes a coil 36 which generates a magnetic field to simulate the swipe of a normal financial card. The coil 36 may also include sensor 38 that can used to sense when the enabling card 20 is ready to read.


In one embodiment the enabling card is an electronic device that communicates with a mobile device 24 as described.



FIG. 5 illustrates an operable embodiment of the invention which comprises the steps of establishing a secure connection with the enabling card 20 and then receiving a request for payment for the enabling card 20 through the P.O.S. terminal 22. Thereafter a payment method can be selected based on GPS coordinates, default settings and user settings as shown. There can be a PIN request if the feature is enabled and thereafter encrypted data may be sent to the enabling card 20 by the mobile device 24. Thereafter an acknowledgement can be received from the enabling card 20.



FIG. 6 also shows the method of establishing a secure connection with the mobile device 24 by means of Bluetooth technology. The swipe action can be detected through on-board proximity sensors 38. A request is sent to the mobile device application 24 to retrieve a method of payment of use. Thereafter encrypted data is received from the mobile device 24 and sent to the enabling card 20. There is a verifying step to verify the integrity and then decrypt the received data. Thereafter an electric signal is generated that reflects the data received and it is sent to the coil 36. The coil 36 generates a magnetic field ready to be picked up by the P.O.S. terminal to complete the transaction.


The mobile device 24 has an app which stores the encrypted information or makes it possible to receive one time encrypted information for either a single enabling card or a plurality of credit card authorization information and the user can select the credit card that is desired for the transaction. Once selected the card information can be securely sent to the enabling card 20. The enabling card 20 is a dumb card or a blank card until it communicates with the mobile device 24.


The invention described herein has the following attributes:

    • 1 Card security improvement. The card does not hold/carry any personal and/or financial information of its owner. A lost or stolen can be easily replaced without any security concern.
    • 2 Total retro-compatibility. The card is compatible with any reading device such as a P.O.S. payment terminal already in use and does not require any software/hardware upgrade in order to work.
    • 3 Update-able. The front of the card can be periodically updated by the financial institute/issuer of the card. This technology can be used to deliver notifications, bar-codes, QR-codes etc. Once modified, the front of the card will maintain its appearance until the next update will be processed, even if the battery is unplugged or totally discharged (power consumption is very minimal).
    • 4 Enormous increment of transactional security. The validation by PIN, or other type of recognition can be processed on the mobile device 24. This new procedure/behaviour will minimize the possibility of PIN involuntary disclosure and be substantially immune to skimmer/man in the middle type of attacks; it will also shift the responsibility for un-authorized transactions.
    • 5 The already ‘armoured’ transaction security can also be further improved, by the delivery of unique and ‘one time only’ credit card numbers for each different transaction.



FIG. 8 illustrates yet another embodiment of the invention where the enabling card 20 is within a phone case 50. More specifically the enabling card 20 is slideably within compartment 52. The method will be the same as previously described except that the enabling card 20 will slide out to one side and the user will swipe the phone as for example in an IPHONE, where the swiping will activate the app and the “PIN” will display on the user's phone.


Although the invention has been described in relation to credit cards it can also be used for NFC, EMV and barcode. Furthermore E-paper controller technology can be used to also periodically visually update the financial institution card with promotional options, logo updates, marketing tools, and notification deliveries.



FIG. 9 is another embodiment of the enabling card 20 which includes the components found in FIG. 4 (top portion not shown in FIG. 9) but whereby the coil 36 in FIG. 4 is being replaced with coils 37a and 37b as shown in FIG. 9. Furthermore, the proximity sensors 38 shown in FIG. 4 can be replaced by capacitive sensors 39a and 39b. Two capacitive sensors 39a and 39b are used such that the enabling card 20 may be swiped in either direction in a POS device.


Furthermore, FIG. 9 shows a strip of Mu-metal 41. The Mu-metal strip in one embodiment is disposed between the two coils 37a and 37b so as to enhance the lines of magnetic field 43 as shown in FIG. 9. More particularly the Mu-metal can in one embodiment comprise 80% nickel, 5% molybdenum with the remainder being iron Fe and unavoidable impurities. The addition of the Mu-metal enhances the generation of the magnetic field 43 such that the enabling card 20 may be used by proximity activation which means that the proximity card 20 may be placed close to the POS device and still work.


Furthermore, two coils 37a and 37b have been shown in the embodiment of FIG. 9 to provide a more homogeneous magnetic field that tends to produce magnetic lines of flux 43 which are substantially parallel and easier to read. In some cases, the enabling card 20 shown at FIG. 4 produces curved magnetic lines.



FIGS. 10-13 show another embodiment of the invention which basically uses the same concept as identified above but where the components are found within a different shape such as a key chain design 51. The key chain design 51 includes an upper housing 53 and lower housing 55 that includes an on button 57 and pay button 59. The key chain design 51 includes either the enabling card 20 shown in FIG. 4 or the enabling card 20 shown in FIG. 9.



FIG. 10 shows that buttons 57 and 59 are used instead of the capacitive sensors 39a and 39b. In use the device 51 is placed close to a POS device whereby button 57 is pressed so as to activate the swiping action and button 59 to activate payment.


Furthermore, the device 51 includes a battery 60.

Claims
  • 1. A system for completing a financial transaction through a Point of Sale (P.O.S.) terminal comprising: a) a mobile phone having an app for containing encrypted credit card authorization information;b) an enabling card comprising: a central processing unit (CPU); andtwo spaced coils and a Mu-metal strip there betweenso as to receive the encrypted credit card authorization information;c) wherein CPU translates the encrypted credit card authorization information and generates a digital signal which digital signal is received by the coils to generate a magnetic field to simulate the swipe of a regular credit card in the P.O.S. terminal and complete the transaction.
  • 2. A system as claimed in claim 1 wherein the CPU translates the encrypted credit card authorization information into a standard track 2 American Bankers Association (ABA) number.
  • 3. A system as claimed in claim 2 the mobile phone app contains a plurality of encrypted credit card authorization information relating to a plurality of credit cards.
  • 4. A system as claimed in claim 3 wherein the enabling card comprises a Universal Serial Bus (USB) serial interface to charge and program the enabling card.
  • 5. A system as claimed in claim 4 further including a micro-controller for EMV and Near Field Communication (NFC) interfaces.
  • 6. A system as claimed in claim 5 wherein the CPU comprises a micro-controller and RAM (random access memory) for processing and firmware storage.
  • 7. A system as claimed in claim 6 wherein the enabling card includes a programming port to download and update firmware to the financial transaction card.
Priority Claims (1)
Number Date Country Kind
CA 2863937 Sep 2014 CA national
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a divisional of (1) U.S. patent application Ser. No. 15/512,379, filed Mar. 17, 2017, and (2) U.S. patent application Ser. No. 16/716,251, filed Dec. 16, 2019, which is a continuation of said U.S. patent application Ser. No. 15/512,379, which said U.S. patent application Ser. No. 15/512,379 is a National Stage Entry of International Patent Application No. PCT/CA2015/000492, filed Sep. 17, 2015, which is a continuation-in-part of U.S. patent application Ser. No. 14/489,006, filed Sep. 17, 2014, each of which is hereby incorporated by reference herein in its entirety.

US Referenced Citations (32)
Number Name Date Kind
5585787 Wallerstein Dec 1996 A
5650606 Baus, Jr. Jul 1997 A
6250557 Forslund et al. Jun 2001 B1
6523754 Hoshino et al. Feb 2003 B2
7375631 Moskowitz et al. May 2008 B2
7489946 Srinivasan et al. Feb 2009 B2
7828214 Narendra et al. Nov 2010 B2
8313037 Humphrey Nov 2012 B1
8348159 Bonalle Jan 2013 B2
8376239 Humphrey Feb 2013 B1
8469277 Johnson, Jr. et al. Jun 2013 B2
8528812 Gannon Sep 2013 B2
8584938 Bonalle et al. Nov 2013 B2
8645213 Granbery Feb 2014 B2
8925826 Liu et al. Jan 2015 B2
9600755 Nielsen et al. Mar 2017 B2
9618591 Radparvar et al. Apr 2017 B1
10068165 Nielsen et al. Sep 2018 B2
10078122 Rapoport Sep 2018 B2
10206315 Kuivalainen Feb 2019 B2
11010743 Andriani May 2021 B2
11144900 Andriani Oct 2021 B2
20020043565 Hoshino et al. Apr 2002 A1
20020043566 Goodman et al. Apr 2002 A1
20020186131 Fettis Dec 2002 A1
20050269401 Spitzer et al. Dec 2005 A1
20060044206 Moskowitz et al. Mar 2006 A1
20070276765 Hazel et al. Nov 2007 A1
20090159689 Mullen et al. Jun 2009 A1
20120039469 Mueller et al. Feb 2012 A1
20120280035 Liu et al. Nov 2012 A1
20140138447 Goldman May 2014 A1
Foreign Referenced Citations (2)
Number Date Country
2863937 Mar 2016 CA
WO 9626500 Aug 1996 WO
Non-Patent Literature Citations (11)
Entry
Corrected Notice of Allowance dated Jun. 16, 2021 in U.S. Appl. No. 15/512,379, pp. 2-7.
Corrected Notice of Allowance dated Jun. 24, 2021 in U.S. Appl. No. 15/512,379, pp. 2-8.
Corrected Notice of Allowance dated Aug. 23, 2021 in U.S. Appl. No. 15/512,379, pp. 2-8.
International Search Report and Written Opinion dated Jan. 6, 2016 in International Patent Application No. PCT/CA2015/000492, pp. 1-6.
Notice of Allowance dated Jan. 15, 2021 in U.S. Appl. No. 16/716,251, pp. 2-4.
Notice of Allowance dated May 21, 2019 in U.S. Appl. No. 15/512,379, pp. 2-10.
Notice of Allowance dated Sep. 16, 2019 in U.S. Appl. No. 15/512,379, pp. 2-10.
Notice of Allowance dated Nov. 3, 2021 in CA Patent Application No. 2972071, pp. 1.
Notice of Allowance dated Dec. 30, 2016 in U.S. Appl. No. 14/489,006, pp. 2-9.
Office Action dated May 3, 2016 in U.S. Appl. No. 14/489,006, pp. 2-11.
Office Action dated Oct. 22, 2015 in U.S. Appl. No. 14/489,006, pp. 2-10.
Related Publications (1)
Number Date Country
20210272091 A1 Sep 2021 US
Divisions (2)
Number Date Country
Parent 15512379 Mar 2017 US
Child 17321408 US
Parent 16716251 Dec 2019 US
Child 15512379 US
Continuations (1)
Number Date Country
Parent 15512379 US
Child 16716251 US
Continuation in Parts (1)
Number Date Country
Parent 14489006 Sep 2014 US
Child 15512379 US