This invention relates to a payment device that is compatible with magnetic readers such as existing point of sale terminal P.O.S. that improves the level of transaction security. More particularly this invention relates to an enabling card and the method and system using the enabling card in a reader such as a P.O.S. where the enabling card is capable of gathering information such as a user's credit card information from a mobile device to complete a payment transaction while placed into a regular P.O.S. terminal.
A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. The magnetic stripe, sometimes called swipe card or magstripe, is read by swiping past a magnetic reading head, such as a P.O.S.
Financial institutions provide a variety of cards, such as credit cards, debit cards and the like. Merchants also provide gift cards or the like. A vast majority of these cards have magnetic stripes and are known as magnetic cards. There are up to three tracks on magnetic cards known as tracks 1, 2, and 3. Track 3 is virtually unused by the major worldwide networks, and often isn't even physically present on the card by virtue of a narrower magnetic stripe. Point-of-sale card readers almost always read track 1, or track 2, and sometimes both, in case one track is unreadable. The minimum cardholder account information needed to complete a transaction is present on both tracks. Track 1 has a higher bit density, and is generally the only track that may contain alphabetic text, and hence is the only track that contains the cardholder's name.
Furthermore many hotels and other institutions including office buildings generate security or access cards in order to allow authorized personal to enter their hotel rooms, institutions or office buildings. There is a general concern to provide only the authorized personal with the security passes.
There have been a variety of prior art devices and methods to improve the security of the above mentioned cards and particularly financial institution cards. For example security codes or PINs, such as a sequence of 4 numbers for example can be a required input into a P.O.S terminal before completing a transaction. However this is not foolproof as security codes can be stolen. Moreover in many cases and in many jurisdictions PINs are not used. Also some cards have chips embedded into the cards or include RFID devices. One chip card technology relates to Europay, Master card, Visa known as EMV.
Other attempts to improve the security of financial transactions are shown in U.S. Pat. No. 8,645,213 which show methods and apparatus, including computer program products, for transactions associated with a mobile device. The method includes, in a merchant device linked to a server by a first network, sending a registration to the server, sending a transaction message to the server, receiving a unique identifier from the server in response to the transaction message, broadcasting the unique identifier, in response to the broadcasted unique identifier, receiving instructions in the server from a mobile application residing in a memory of a mobile device over a second network, processing a transaction in response to the instructions, and notifying the merchant device of the processed transaction.
Furthermore U.S. Pat. No. 8,348,159 shows a wireless financial transaction instrument, such as a card, that has a magnetic stripe, a display, and an on-board power supply, such as a battery, and is usable with a dual capture point of sale terminal. Information is received by such a terminal from the card wirelessly, and also from the magnetic stripe, and the data received contactlessly is preferably used to verify that read from the stripe. The display can display the account number on command, or to display a current balance, or amount of credit remaining, or any combination of these items of information.
Moreover U.S. Pat. No. 8,584,938 illustrate a wireless transaction medium having combined magnetic stripe and radio frequency communications.
Finally U.S. Pat. No. 8,469,277 shows methods, systems, and computer program products for acquiring payment device data for wireless payment transactions. According to one method, a request from a wireless payment reader for standardized payment device data for effecting a wireless payment is received by a wireless smart payment device. Payment device data elements are assembled by the wireless smart payment device into the standardized payment device data. The standardized payment device data are sent by the wireless smart payment device to the wireless payment reader.
It is an object of this invention to provide an improved payment device and method and system to improve the security of payment using magnetic cards or tap and go cards or RFID devices.
This invention relates to an enabling card for completing a transaction in a reader comprising: a) a processor carried by the enabling card for: i) establishing a connection with a device; ii) receiving secure information from the device and generating a signal; b) structure carried by the enabling card for generating a magnetic field in response to the signal to simulate the swipe of card in the reader
This invention relates to an enabling card for completing a transaction in a reader comprising; a processor carried by the enabling card for: establishing a connection with a mobile device; receiving secure information from a the mobile device and generating a digital signal; a coil carried by the enabling card for generating a magnetic field in response to the digital signal to simulate the swipe of card in the reader and complete the financial transaction.
It is another aspect of the invention to provide a system for completing a financial transaction through a P.O.S. terminal comprising: a mobile phone having an app for containing encrypted credit card authorization information; an enabling card comprising: a CPU; a Bluetooth module for establishing a connection with the mobile phone app; and a coil so as to receive the encrypted credit card authorization information; wherein the CPU translates the encrypted credit card authorization information to generate a digital signal which communicates with the coil to generate a magnetic field to simulate the swipe of a regular credit card in the P.O.S terminal and complete the transaction.
Yet another aspect of this invention relates to a method of completing a financial transaction in a P.O.S. terminal comprising the steps of: inserting an enabling card into the P.O.S terminal, said enabling card lacking authorization information; establishing a wireless connection between the enabling card and a mobile phone application containing encrypted credit card authorization information; transferring the credit card authorization information from the mobile phone to the enabling card; generating a magnetic field in response to the credit card authorization information transferred the credit card so as to complete the transaction.
These and other objects and features of the invention will be described with reference to the following drawings.
A detailed description of preferred embodiments is provided herein below by way of example only and with reference to the following drawings, in which:
The magnetic strip 4 can by way of example contain the following sequence as shown in
The invention to be described herein comprises in one embodiment moving the encrypted information or authorization 10 that normally resides in a card 2 to a mobile device 24 such as a mobile phone 24, or obtaining a one time encrypted authorization by the mobile phone 24 from a financial institution, vendor, hotel, organization, office or the like. In either case the enabling or authorization card 20 to be described herein gathers the:
In the case where the enabling card 20 acts as a financial institution card 2, once the transaction is completed the enabling card 20 loses the encrypted information or one time encrypted authorization—but the encrypted information resides within the mobile phone 24. In other words there is separation of the encrypted information or one time encrypted authorization from the card 2 to the mobile device 24 which communicates with the enabling card 20.
In the case of a hotel door card, organization, or office security card or the like the encrypted information would reside in the mobile phone 24. In other words hotels or vendors could send the encrypted information (which could be time sensitive) ahead of time to the guest or on the spot; making it easier and more secure than heretofore. By time sensitive we mean that the hotel door security card does not work after the guest hotel stay expires.
Thus the invention described herein contemplates the use of one enabling card 20 that can be activated or deactivated by a financial institution, vendor, hotel, organization or office as the need arises; or the use of a plurality of enabling cards 20 that are activated or deactivated by a plurality of financial institutions, vendors, hotels, organizations, offices or the like as the need arises.
In one embodiment the CPU communicates by a Bluetooth technology which is generally more secure than WiFi. Generally speaking WiFi technology is easier to intercept than that of Bluetooth. The enabling card 20 also can include a rechargeable battery 32 which can comprise a Li—Po battery or a miniature solar panel which is part of the enabling card 20 that can be charged by the sun or the like.
The enabling card 20 also includes a programmable port 34 and includes a coil 36 which generates a magnetic field to simulate the swipe of a normal financial card. The coil 36 may also include sensor 38 that can used to sense when the enabling card 20 is ready to read.
In one embodiment the enabling card is an electronic device that communicates with a mobile device 24 as described.
The mobile device 24 has an app which stores the encrypted information or makes it possible to receive one time encrypted information for either a single enabling card or a plurality of credit card authorization information and the user can select the credit card that is desired for the transaction. Once selected the card information can be securely sent to the enabling card 20. The enabling card 20 is a dumb card or a blank card until it communicates with the mobile device 24.
The invention described herein has the following attributes:
Although the invention has been described in relation to credit cards it can also be used for NFC, EMV and barcode. Furthermore E-paper controller technology can be used to also periodically visually update the financial institution card with promotional options, logo updates, marketing tools, and notification deliveries.
Furthermore
Furthermore two coils 37a and 37b have been shown in the embodiment of
Furthermore the device 51 includes a battery 60.
Number | Date | Country | Kind |
---|---|---|---|
CA 2863937 | Sep 2014 | CA | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/CA2015/000492 | 9/17/2015 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2016/041055 | 3/24/2016 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5585787 | Wallerstein | Dec 1996 | A |
5650606 | Baus, Jr. | Jul 1997 | A |
6250557 | Forslund | Jun 2001 | B1 |
6523754 | Hoshino | Feb 2003 | B2 |
7375631 | Moskowitz | May 2008 | B2 |
7489946 | Srinivasan | Feb 2009 | B2 |
7828214 | Narendra | Nov 2010 | B2 |
8313037 | Humphrey | Nov 2012 | B1 |
8348159 | Bonalle et al. | Jan 2013 | B2 |
8376239 | Humphrey | Feb 2013 | B1 |
8469277 | Johnson, Jr. et al. | Jun 2013 | B2 |
8528812 | Gannon | Sep 2013 | B2 |
8584938 | Bonalle et al. | Nov 2013 | B2 |
8645213 | Granbery et al. | Feb 2014 | B2 |
8925826 | Liu | Jan 2015 | B2 |
9600755 | Nielsen | Mar 2017 | B2 |
9618591 | Radparvar | Apr 2017 | B1 |
10068165 | Nielsen | Sep 2018 | B2 |
10078122 | Rapoport | Sep 2018 | B2 |
10206315 | Kuivalainen | Feb 2019 | B2 |
11010743 | Andriani | May 2021 | B2 |
20020043565 | Hoshino et al. | Apr 2002 | A1 |
20020043566 | Goodman | Apr 2002 | A1 |
20020186131 | Fettis | Dec 2002 | A1 |
20050269401 | Spitzer | Dec 2005 | A1 |
20060044206 | Moskowitz | Mar 2006 | A1 |
20070276765 | Hazel | Nov 2007 | A1 |
20090159689 | Mullen | Jun 2009 | A1 |
20120039469 | Mueller | Feb 2012 | A1 |
20120280035 | Liu | Nov 2012 | A1 |
20140138447 | Goldman | May 2014 | A1 |
Number | Date | Country |
---|---|---|
WO 9626500 | Aug 1996 | WO |
Entry |
---|
International Search Report and Written Opinion dated Jan. 6, 2016 in International Patent Application No. PCT/CA2015/000492. |
Notice of Allowance dated Dec. 30, 2016 in U.S. Appl. No. 14/489,006. |
Office Action dated May 3, 2016 in U.S. Appl. No. 14/489,006. |
Office Action dated Oct. 22, 2015 in U.S. Appl. No. 14/489,006. |
Number | Date | Country | |
---|---|---|---|
20170249615 A1 | Aug 2017 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14489006 | Sep 2014 | US |
Child | 15512379 | US |