The present application is related to concurrently filed U.S. patent application Ser. No. 14/596,508, filed Jan. 14, 2015 entitled “System and Method for Requesting Reconciliation of Electronic Transaction Records for Enhanced Security”; U.S. patent application Ser. No. 14/596,472, filed Jan. 14, 2015 entitled “System and Method for Comparing Electronic Transaction Records for Enhanced Security”; and U.S. patent application Ser. No. 14/596,572, filed Jan. 14, 2015 entitled “Smart Card Systems Comprising a Card and a Carrier,” the disclosures of which are incorporated herein by reference.
The present invention relates to electronic transactions. More specifically, the present invention relates to systems and methods for reconciling electronic transaction records for enhanced security.
Electronic transactions—such as for payments or access to a facility or computer—can be conducted using electronic portable transaction devices, such as smart cards or mobile devices. A smart card is a device that includes an embedded integrated circuit chip that can be either a secure processing module (e.g., microprocessor, microcontroller or equivalent intelligence) operating with an internal or external memory or a memory chip alone. Smart cards can provide identification, authentication, data storage, and application processing. Smart cards can serve as credit or ATM debit cards, phone or fuel cards, and high-security access-control cards for granting access to a computer or a physical facility. Smart cards can authenticate identity of the user by employing a token, such as public key infrastructure (PKI) and one-time-password (OTP). In addition, smart cards can be configured for a biometric authentication to provide an additional layer of security.
Similarly, mobile devices such as smartphones, PDAs, tablets, and laptops can provide a platform for electronic transactions. For example, a user of a mobile device can conduct an electronic transaction for purchase of a product or service using an application that communicates with a mobile payment service. Mobile devices can be configured for a token-based authentication and/or a biometric authentication.
These methods, however, are not immune to identity theft. For example, an identity thief can potential steal a token associated with a smart card or a mobile device and use the token to conduct a fraudulent transaction. What is needed is an additional layer of security that can eliminate or reduce risk for such a fraudulent transaction.
Various embodiments of the present disclosure are directed to enhancing security of electronic transactions through reconciliation of prior electronic transactions.
In accordance with the technology described herein, a method of enhancing security of an electronic transaction comprises receiving a request for an authentication of an electronic portable transaction device in connection with a new electronic transaction involving the electronic portable transaction device; retrieving a first record of one or more previous electronic transactions involving the electronic portable transaction device from a first storage device; retrieving a second record of one or more previous electronic transactions involving the electronic portable device from a second storage device; and determining whether the first record and the second record are reconcilable.
Other features and aspects of the disclosed technology will become apparent from the following detailed description, taken in conjunction with the accompanying drawings, which illustrate, by way of example, the features in accordance with embodiments of the disclosed technology. The summary is not intended to limit the scope of any inventions described herein, which are defined solely by the claims attached hereto.
The technology disclosed herein, in accordance with one or more various embodiments, is described in detail with reference to the following figures. The drawings are provided for purposes of illustration only and merely depict typical or example embodiments of the disclosed technology. These drawings are provided to facilitate the reader's understanding of the disclosed technology and shall not be considered limiting of the breadth, scope, or applicability thereof. It should be noted that for clarity and ease of illustration these drawings are not necessarily made to scale.
The present disclosure addresses this and other problems associated with electronic transactions by providing a procedure for authenticating an electronic portable transaction device based on reconciliation of previous transaction records (hereinafter “reconciliation-based authentication procedure”). A first record of one or more previous transactions involving the electronic portable transaction device is reconciled with a second record of one or more previous transactions involving the electronic portable transaction device.
In the following detailed description, numerous specific details are set forth to provide a full understanding of various aspects of the subject disclosure. It will be apparent, however, to one ordinarily skilled in the art that various aspects of the subject disclosure may be practiced without some of these specific details. In other instances, well-known structures and techniques have not been shown in detail to avoid unnecessarily obscuring the subject disclosure.
The PTD 110 can conduct various types of electronic transactions with the TPS 130 via the interface device 120. For financial transaction applications, the PTD 110 can be a smart payment card such as a smart credit, debit, and/or prepaid card, or a smartphone with a payment transaction application. The TPS 130 can be a payment processing system of a merchant (e.g., Target®), a bank (e.g., Bank of America®), or a card issuer (e.g., Visa®). The interface device 120 can be a point of sale (POS) terminal that can communicate with the PTD 110 using a contact method (e.g., matching male and female contact pads) or a contactless method (e.g., RFID, Bluetooth, NFC, Wi-Fi, ZigBee).
For access control applications, the PTD 110 can be a smart access card for providing access to a facility or computer. The TPS 130 can be a server in a central computer system, or a dedicated access controller that controls an access to a facility or computer. Interface device 120 can be a card reader that can communicate with the PTD 110 using a contact method (e.g., contact pads) or a contactless method (e.g., RFID, Bluetooth, NFC, Wi-Fi, ZigBee).
In the illustrated example of
In accordance with various aspects of the present disclosure, security of electronic transactions involving an electronic portable transaction device, such as a smart card or a mobile device, can be improved by providing a reconciliation-based authentication procedure before a new transaction involving the portable transaction device is authorized. With reference to
In certain embodiments, the records of transaction-related data items stored in designated storage devices may be different. By way of example, in the smart payment card embodiment, the memory 114 at the PTD 110 may store security tokens, transaction times, and transaction amounts while the database 134 at the TPS 130 may store security tokens, store names and locations, and UPC codes of the products purchased. As long as there is at least one common data type stored in the designated storage devices (security token in this example), reconciliation of the transaction records can be performed.
In some embodiments, a reconciliation of a first record and a second record can include comparing a first set of one or more most-recent transactions in the first record stored in a first storage device with a second set of one or more most-recent transactions stored in a second storage device, and determining whether there is at least a predetermined number of matches between the two sets of most-recent transactions. In some embodiments, the first and second records are determined to be reconciled as long as there is at least one match between the two sets. In other embodiments, the first and second records are determined to be reconciled only if there are matches for all transactions in the two sets.
In some embodiments, a reconciliation of a first record and a second record can include comparing a first set of one or more previous transactions in the first record that satisfy certain predetermined criteria with a second set of one or more previous transactions in the second record that satisfy the same predetermined criteria, and determining whether there is at least a predetermined number of matches between the first set and the second set. In various embodiments, the predetermined criteria can include a minimum amount for a transaction. In this manner, the first and second sets being compared include only data items for which the amount of the transaction is greater than the minimum amount (e.g., $20). In various embodiments, the predetermined criteria can include transactions involving one or more entities (e.g., merchants, stores, banks, facilities, computer networks) that support the reconciliation-based authentication procedure.
In the illustrated embodiment of
The interface 116 and the interface 126 provide a communication link between the PTD 310 and the interface device 320. Using this communication link, the PTD 110 can communicate authentication- and/or transaction-related data with the interface device 120 and/or the TPS 130. In some embodiments, the PTD 110 can also receive power in the form of a voltage and/or current from the interface device 120 via the interfaces 116, 126. In certain embodiments, the interfaces 116, 126 can include a pair of male and female contact pads provided in the PTD (e.g., a smart card) and the interface device (e.g., a POS terminal). In some embodiments, the interfaces 116, 126 can include a pair of transceivers supporting wireless standards such as RFID, Bluetooth, Wi-Fi, NFT, and ZigBee. In some embodiments, the interface 116 can be a display of the mobile terminal that presents a code (e.g., a bar code or QR code) and the interface 126 can be an optical/infrared code scanner coupled to a POS terminal. In some embodiments, the interfaces 116,126 are a pair of wireless transceivers in a mobile device (e.g., a smartphone) and a POS terminal, respectively. In some embodiments, where the PTD 110 is a contactless smart card and the interface device 120 is a mobile device (e.g., a smartphone), the interfaces 116, 126 can include a pair of wireless transceivers in the contactless smart card and the mobile device, respectively.
In some embodiments, the PTD 110 is a mobile device that communicates with the TPS 130 via a wide area wireless network, such as a 3G UMTS or 4G LTE network, without the need for an interface device 120. In some embodiments, the PTD 110 is a smart card having a wireless capability that allows the card to communicate with the TPS 130 via a cellular network, such as a 3G UMTS or 4G LTE network, without the need for an interface device 120.
In certain embodiments, the processor 112 is configured to perform an authentication procedure using a security token stored in the first memory 113. Such a token-based authentication procedure is known in the art, and an exemplary procedure is described in “EMV® Payment Tokenisation Specification, Technical Framework” version 1.0, March 2014, which is incorporated herein by reference for all purposes.
In certain embodiments, the PTD 110 can include a biometric authentication module 350 that includes a control 352 and a biometric sensor 355. In other embodiments, the biometric authentication module 350 can be in the interface device (e.g., a POS terminal) instead of in the PTD 110. Biometric authentication can begin with the collection of a digital biometric sample (e.g., bitmap image of user's fingerprint) using the biometric sensor 355. Useful features contained in the collected sample are then extracted and formatted into a template record that can be matched against other template records. In various embodiments, the template is stored at registration (and when combined with identity vetting, establishes an identity) in a memory (not shown) inside the biometric authentication module 350 or in one of the first and second memories 113, 114. When a transaction takes place, the biometric sensor 355 can measure the same biometric characteristic and the control 352 can process the measured biometric characteristic into a template format, and compare the template to the previously registered template.
Biometric measurements may vary slightly from one measurement to the next. This variation is not typically due to changes in the biometric feature being measured but to the mechanism and environment in which the data are captured. Therefore, a biometric sample measured at registration may not precisely match the results of the live sample measurement. As a result of this variability, in various embodiments a similarity score is generated and this score is compared against a pre-determined threshold value to determine what constitutes an acceptable match.
As described above, various electronic transaction systems 100, 200, 300 of the present disclosure employ a reconciliation-based authentication procedure in addition to or in lieu of a token-based authentication procedure and a biometric authentication procedure. In embodiments that employ token-based and/or biometric-based authentication, a reconciliation-based authentication can be performed before, during, or after a token-based and/or biometric-based authentication to provide an extra layer of security.
With a reference to the embodiment of
In some embodiments, a reconciliation-based authentication procedure can be initiated by a device that is different from a device that performs the reconciliation (e.g., comparison of the first and second records). For example, the TPS 330 can send a request for a reconciliation-based authentication in connection with a new transaction involving the PTD 310. In some embodiments, the TPS 330 can also send a first record of one or more previous transactions involving the PTD 310 that are stored in the database 134. The processor 122 at the interface device 320 can receive the request and the first record from the TPS 330, retrieve a second record of one or more previous transactions involving the PTD 310 from the memory 114, and compare the first record and the second record for a match. In other embodiments, the interface device 320 passes the request and the first record received from the TPS 330 to the PTD 310, and the processor 112 at the PTD 310 receives the request and the first record from the interface device 320, retrieve a second record of one or more previous transactions stored in the second memory 114 and compare the first record to the second record for a match. In some embodiments where the PTD 310 (e.g., a smartphone) has the capability to communicate with a cellular network, such as a 3G UMTS or 4G LTE network, the PTD 310 can receive the request and the first record from the TPS 330 via the cellular network without involving an interface device such as a POS terminal.
In some embodiments, the PTD 310 can send a request for a reconciliation-based authentication in connection with a new transaction involving the PTD 310. The PTD 310 can also send a first record of one or more previous transactions involving the PTD 310 that are stored in the second memory 114. The processor 122 at the interface device 320 can receive the request and the first record from the PTD 310, retrieves a second record of one or more previous transactions involving the PTD 310 from the database 134 at the TPS 330, and compares the first record and the second record for a match. In other embodiments, the interface device 320 passes the request for authentication and the first record received from the PTD 310 to the TPS 330, and the processor (e.g., server) 132 at the TPS 330 receives the request and the first record from the interface device 320, retrieves a second record of one or more previous transactions involving the PTD 310 stored in the database 134 and compares the first record to the second record for a match. In some embodiments where the PTD 310 (e.g., a smartphone) has the capability to communicate with a cellular network, such as a 3G UMTS or 4G LTE network, the PTD 310 can send the request and the first record to the TPS 330 via the cellular network without involving an interface device such as a POS terminal.
In some embodiments, the interface device 320 can initiate a reconciliation-based authentication procedure by sending a request for the authentication to either the PTD 310 or the TPS 330. If the request is sent to the PTD 310, the processing module 122 at the interface device 320 can retrieve a first record of one or more previous electronic transactions involving the PTD 310 from the user database 134 at the TPS 330 and send the first record to the PTD 310. The processing module 112 at the PTD 310 can receive the request and the first record from the interface device 320, retrieve a second record of one or more previous transactions stored in the memory 114, and perform a comparison between the first and second records for a match. On the other hand, if the request is sent to the TPS 330, the processing module 122 at the interface device 320 can retrieve a first record of one or more previous electronic transactions involving the PTD 310 from the second memory 114 at the PTD 310 and send the first record to the TPS 330. The server 132 at the TPS 330 can receive the request and the first record from the interface device 320, retrieve a second record of one or more previous transactions involving the PTD 310 stored in the database 134, and perform a comparison between the first and second records for a match.
Various example arrangements of electronic transaction systems implementing a reconciliation-based authentication procedure are described below with respect to
To enable communication between the payment processing system 430 and the merchant's internal payment transaction system 401, the interface devices 420A-E and the server 442 in the internal payment transaction system 401 have wired or wireless connections to an internal communication network 404 (e.g., Intranet), which is in turn connected a wide area network 406 (e.g., Internet). In this manner, the POS terminals 420A-E, the smart payment cards 410A-E, and the server 442 can engage in data communication with the server(s) 432 at the payment processing system 430.
In the illustrated example of
The interface device 420B is a fixed POS terminal that is configured to operate with a contactless smart payment card 410B and has a wired connection (e.g., wired Ethernet) to the internal communication network 404. During a payment transaction, the contactless smart payment card 410B is placed adjacent to the POS terminal 420B for wireless data communication. For this purpose, the contactless smart payment card 410B and the POS terminal 420B can be equipped with transceivers based on a wireless standard or technology, such as RFID, Bluetooth, NFC, Wi-Fi, and ZigBee.
The interface device 420C is a portable POS terminal that is configured to operate with a contact smart payment card 410C, and the portable POS terminal 420C has a wireless connection (e.g., wireless Ethernet) to the internal communication network 404. During a payment transaction, the contact smart payment card 410C is inserted into the portable POS terminal 420C for data communication. In various embodiments, the contact smart payment card 410C can be equipped with male contact pads and the POS terminal 420C can be equipped with corresponding female contact pads or vice versa. Other methods of providing contact-based communication coupling between the contact smart payment card 410C and the POS terminal 420C including, micro connectors, can be utilized.
The interface device 420D is a portable POS terminal that is configured to operate with a contactless smart payment card 410D, and POS terminal 420D has a wireless connection (e.g., wireless Ethernet) to the internal communication network 404. During a payment transaction, the contactless smart payment card 410D is placed adjacent to the portable POS terminal 420D for wireless data communication. For this purpose, the contactless smart payment card 410D and the POS terminal 420D can be equipped with transceivers based on a wireless standard or technology, such as RFID, Bluetooth, NFC, Wi-Fi, and ZigBee.
The interface device 420E is a fixed POS terminal that is configured to operate with a mobile device (e.g., a smartphone, PDA, tablet), and has either a wired connection (e.g., wired Ethernet) or a wireless connection (e.g., Wi-Fi) to the internal communication network 404. During a payment transaction, the mobile terminal 410E is placed adjacent to the POS terminal 420E for wireless data communication. For this purpose, the mobile terminal 410E and the POS terminal 420E can be equipped with transceivers based on a wireless standard or technology such as RFID, Bluetooth, NFC, Wi-Fi, and ZigBee. In certain alternative embodiments, the POS terminal 420E can have a wireless connection (e.g., wireless Ethernet) to the internal communication network 404. In some embodiments, the POS terminal 420E can be equipped with an optical scanner or camera that can read a code (e.g., bar code or QR code) displayed on a display of the mobile terminal 410E.
For ease of illustration only, without any intent to limit the scope of the present disclosure in any way, various aspects of operation of the electronic payment transaction system 400 will be described with respect to the contact smart payment card 410A and the POS terminal 420A. It shall be appreciated by those skilled in the art in view of the present disclosure that the described operation is applicable to other portable transaction devices (e.g., 410B-E) and interface devices (e.g., 420B-E).
In operation, a new transaction is initiated when a user presents the smart payment card 410A at the POS terminal 420A to pay for products and/or services by, for example, inserting the card 410A into the POS terminal 421 as shown in
In certain embodiments, the reconciliation-based authentication is performed at the payment processing system 430. By way of example, after making a data connection with the card 410A, the POS terminal 420A can retrieve (e.g., request and receive) a security token from the card 410A. The POS terminal 420A can also retrieve a first record of one or more previous transactions involving the card 410A from the memory 114. The POS terminal 420A can send a request for approval of the new transaction to the payment processing system 430 along with the security token and the first record retrieved from the card 410A. The server(s) 432 at the payment processing system 420 receives the request and the first record and performs an authentication with respect to the security token received from the POS terminal 420. Upon a successful token-based authentication, the server(s) 432 can perform a reconciliation-based authentication by determining whether the first record received from the POS terminal 420A can be reconciled with a second record of one or more previous transactions involving the card 410A stored in the user database 434.
In certain embodiments, the reconciliation-based authentication is performed at the POS terminal 420A. By way of example, after making a data connection with the card 410A, the POS terminal 420A can retrieve a security token and a first record of one or more previous transactions from the card 410A. The POS terminal 420A can send the security token to the payment processing system 430, and the server(s) 432 at the payment processing system 420 performs a token-based authentication. If the token-based authentication is successful, the server(s) 432 can retrieve a second record of one or more previous transactions involving the card 410A from the user database 434 and send the second record to the POS terminal 420A with an indication that the token-based authentication was successful. The processor 122 at the POS terminal 420A, upon receiving the second record, performs a reconciliation-based authentication by determining whether the first record received from the card 410A can be reconciled with the second record received from the payment processing system 430. In some embodiments, the POS terminal 420A can retrieve the second record from the database 444 in the merchant's internal payment transaction system 401 rather than from the database 434 at the payment processing system 430.
In certain embodiments, the reconciliation-based authentication is performed at the smart payment card 410A. By way of example, after making a data connection with the card 410A, the POS terminal 420A can retrieve a security token from the card 410A and send the security token to the payment processing system 430. The server(s) 432 at the payment processing system 420 performs a token-based authentication. If the token-based authentication is successful, the server(s) 432 retrieves a first record of one or more previous transactions involving the card 410A from the user database 434 and send the second record to the POS terminal 420A with an indication that the token-based authentication was successful. The POS terminal 420A, upon receiving the second record from the payment processing system, sends the second record to the card 410A. The processor 112 at the card 410A performs a reconciliation-based authentication by determining whether the first record received from the payment processing system 430 via the POS terminal 420A can be reconciled with a second record of one or more previous transactions stored in the memory 114 at the card 410A.
There can be many different ways of determining whether the first record and the second record are reconcilable. In certain embodiments, the reconcilability determination can involve comparing one or more transaction-related data items in the first record with one or more transaction-related data items in the second record and determining whether there is at least a predetermined number of matches. For example, security tokens and transaction times for the five (5) most-recent transactions in the first record can be compared to security tokens and transaction times for 5 most-recent transactions in the second record. If the comparison produces a number of matches that is equal to or greater than a predetermined number (e.g., 1-5 transactions matched), the first and second records are determined to be reconcilable and the new transaction is approved. On other hand, if the number of matches is less than the predetermined number, the first and second records are determined to be irreconcilable and the new transaction is denied.
In some embodiments, the reconcilability determination can involve comparing one or more previous transactions in the first record that satisfy certain criteria to one or more previous transactions in the second record that satisfy the same criteria. For example, one or more previous transactions in the first record that exceeded a predetermined transaction amount (e.g., $20) can be compared to one or more previous transactions in the second record that exceeded the same predetermined transaction amount. In this manner, small-amount transactions that do not require a reconciliation-based authentication are automatically excluded. By way of another example, one or more previous transactions in the first record that involved one or more specific entities (e.g., merchants, banks, or government agencies) can be compared to one or more previous transactions in the second record that involved the same entity or entities. For example, there can be a group of merchants that support or participate in a particular reconciliation-based authentication standard, although the smart payment card 410A can be used for transactions with other merchants that do not support the standard. In this example, only previous transactions from the first and second records that involved participating merchants are compared.
The first electronic payment transaction 501 involves a contact smart payment card 510A coupled to the mobile terminal 520A via a smart card reader 525 and conducting a payment transaction with the payment processing system 530 via the cellular network 506. The second electronic payment transaction 502 involves a contactless smart payment card 510B wirelessly coupled to the mobile terminal 520B and conducting a payment transaction with the payment processing system 530 via the cellular network 506. The third electronic payment transaction 503 involves the mobile terminal 510C as a portable transaction device and an interface device. In some embodiments, mobile terminal 510 can capture an image of a code (e.g., a bar or QR code) associated with a product printed on a package of the product, in a catalog, or advertisement using an image capture device (e.g., a camera) and conducting a payment transaction for the product with the payment processing system 530 via the cellular network 506.
In each of these payment transactions 501, 502, 503, a reconciliation-based authentication procedure similar to the reconciliation-based authentication procedures described above with respect to
For the second payment transaction 502, reconciliation of a first record of one or more previous transactions involving the smart payment card 510B and a second record of one or more previous transactions involving the smart payment card 510B can be performed by server(s) 532 at the payment processing system 530, a processor in the mobile terminal 520B, or a processor in the smart payment card 510B. The first record can be stored in a memory in the smart payment card 510B or in a memory in the mobile terminal 520B. The second record can be stored in the database 534 at the payment processing system 530 or in a memory in the mobile terminal 520B.
For the third payment transaction 503, reconciliation of a first record of one or more previous transactions involving the mobile terminal 510C and a second record of one or more previous transactions involving the mobile terminal 510C can be performed by server(s) 532 at the payment processing system 530, or a processor in the mobile terminal 510C. The first record can be stored in a memory in the mobile terminal 510C, and the second record can be stored in the database 534.
In certain embodiments, multiple reconciliations (e.g. comparison of previous transactions for a match) can be performed by multiple devices. By way of example, in the first payment transaction 501, a processor in the smart payment card 510A can perform a first comparison of a first record of one or more previous transactions involving the card 510A retrieved from the database 534 at the payment transaction center 530 with a second record of one or more previous transactions involving the card 510A retrieved from a memory of the card 510A. In addition, a processor in the mobile terminal 520A can perform a second comparison of the first record of one or more previous transactions involving the card 510A retrieved from the database 534 at the payment transaction center 530 with a third record of one or more previous transactions retrieved from a memory of the mobile terminal 520A.
By way of another example of multiple reconciliations, the server 534 at the payment processing system 530 can perform a first comparison of a first record of one or more previous transactions involving the card 510A retrieved from the database 534 with a second record of one or more previous transactions involving the card 510A retrieved from a memory of the mobile terminal 520A. In addition, a processor in the smart payment card 510A can perform a second comparison of the first record of one or more previous transactions involving the card 510A retrieved from the database 534 at the payment transaction center 530 with a third record of one or more previous transactions retrieved from a memory of the card 510A. It shall be appreciated by those skilled in the art in view of the present disclosure that there are other configurations of devices and records for performing multiple reconciliations.
In the first computer access transaction 601, a user can insert a contact smart access card 610A into a card reader 620A coupled to the desktop computer 650A for access to the desktop computer 650A and/or the central computer system 632. In the illustrated example, the desktop computer 650A is coupled to the network 608 via a wired connection. In the second computer access transaction 602, a user can place a contactless smart access card 610B adjacent to a card reader 620B coupled to a laptop computer 650B for access to the laptop computer 650B and/or the server(s) 632 and the database 634 in the central computer system 630. The laptop computer 650B is coupled to the network 608 via a wireless connection.
In each of these computer access transactions 601, 602, a reconciliation-based authentication procedure similar to the reconciliation-based authentication procedures described above with respect to
In the first facility access transaction 701, a user presents the smart access card 710A to the card reader 720B to gain access to a facility. The card reader 720B can communicate with the card 710A using one of various contact or contactless methods, including non-limiting examples described above. In the second facility access transaction 702, a user presents the smart access fob 710A to the fob reader 720B to gain access to the facility.
In each of these facility access transactions 701, 702, a reconciliation-based authentication procedure similar to the reconciliation-based authentication procedures described above with respect to
The process 800 starts at state 801 and proceeds to operation 810, in which a processing module in a device receives a request for an authentication of the portable transaction device. The device that receives the request is hereinafter referred to as “the authentication device.” The authentication device can be the portable transaction device, a transaction processing system configured to process transactions involving the portable transaction device, or an interface device configured to facilitate communications between the portable transaction device and the transaction processing system. In some embodiments, the authentication device performs a token-based authentication and/or a biometric-based authentication before, during, or after the reconciliation-based authentication. Non-limiting examples of the portable transaction device include a smart payment card, a smart computer access card, a smart facility access card, a mobile terminal configured for payment transactions, or a mobile terminal configured for computer or facility access transactions. Non-limiting examples of the transaction processing system include a payment processing system (e.g., for credit card or debit card transactions), a central computer system (including, e.g., server(s) and database(s)), or a dedicated access controller. Non-limiting examples of the interface device include a fixed or portable POS terminal, a mobile terminal, and a contact or contactless smart card or smart fob readers.
The process 800 proceeds to operation 820, in which a processing module in the authentication device receives a first record of one or more previous transactions involving the portable transaction device from a first data storage device configured to store data items related to transactions involving the portable transaction device. Non-limiting examples of such transaction-related data items include tokens or passwords used, locations, transaction times and durations, products or services purchased, and/or accessed files and applications. The first data storage device can be a memory (e.g., a database) at the transaction processing system, a memory in the portable transaction device, or a memory in the interface device. The first data storage device can be in the authentication device or in another device in the electronic transaction system.
The process 800 proceeds to operation 830, in which a processing module in the authentication device receives a second record of one or more previous transactions involving the portable transaction device from a second data storage device configured to store data items related to transactions involving the portable transaction device. Non-limiting examples of such transaction-related data items include tokens or passwords used, locations, transaction times and durations, products or services purchased, and/or accessed files and applications. The second data storage device can be a memory (e.g., a database) at the transaction processing system, a memory in the portable transaction device, or a memory in the interface device. The second data storage device can be in the authentication device or in another device in the electronic transaction system.
The process 800 proceeds to operation 840, in which a processing module in the authentication device compares the first record to the second record to determine if there is a match. The comparison can involve one or more transaction-related data items in the first record with one or more transaction-related data items in the second record. For example, security tokens and transaction times in the first record can be compared to security tokens and transaction times in the second record.
The process 800 proceeds to query state 850, in which a processing module in the authentication device determines if there is a match between the first and second records. If the answer to the query is “yes” (i.e., there is a match), the process 800 proceeds to operation 860, in which the processing module provides an indication of the match to a device from which the authentication device received the request at operation 810. The process 800 proceeds to operation 870, in which a processor in the conciliation device causes one or more transaction-related data items for the new transaction be stored in the first storage device and the second storage device.
On the other hand, if the answer to the query at the state 850 is “no” (i.e., there is no match), the process 800 proceeds to operation 880, in which a processor in the authentication device provides an indication of no match to a device from which the authentication device received the request at operation 810. The process 800 ends a state 809.
It shall be appreciated by those skilled in the art in view of the present disclosure that there are numerous possible pairs of a requesting device and an authentication device. In the electronic payment system 400 of
The process 900 proceeds to operation 920, in which a processing module in the requesting device sends a first record of one or more previous transactions involving the electronic portable transaction device to the authentication device for reconciliation (e.g., comparison) with a second record of one or more previous transactions involving the electronic portable transaction device, either directly or via another device (e.g., an interface device).
The process 900 proceeds to operation 930 in which a processing module in the requesting device receives a message indicating whether there is a match between the first record and the second record.
The process 900 proceeds to query state 940, in which a processing module in the requesting device determines whether the message indicates that there is a match between the first record and the second record. If the answer to the query is “yes” (i.e., there is a match), the process 900 proceeds to operation 950, in which a processing module in the requesting device authorizes the new transaction for which the authentication request was sent in operation 910.
On other hand, if the answer to the query is “no” (i.e., there is no match), the process 900 proceeds to operation 960, in which a processing module in the requesting device denies the new transaction. In some embodiments, the requesting device may also cause the portable transaction device to be disabled. The process 900 ends at state 909.
It shall be appreciated by those skilled in the art in view of the present disclosure that various described operations of the exemplary processes 800 and 900 may be performed in different orders, optionally skipped, and/or removed. For example, in an electronic transaction system in which the authentication device is also the device that initiates and/or authorizes new transactions, the operation 810 in the process 800 illustrated in
The description of the technology is provided to enable any person skilled in the art to practice the various embodiments described herein. While the technology has been particularly described with reference to the various figures and embodiments, it should be understood that these are for illustration purposes only and should not be taken as limiting the scope of the various embodiments.
There may be many other ways to implement the various embodiments. Various functions and elements described herein may be partitioned differently from those shown without departing from the spirit and scope of the technology disclosed. Various modifications to these embodiments will be readily apparent to those skilled in the art, and generic principles defined herein may be applied to other embodiments. Thus, many changes and modifications may be made to the various embodiments, by one having ordinary skill in the art, without departing from the spirit and scope of the various embodiments.
A reference to an element in the singular is not intended to mean “one and only one” unless specifically stated, but rather “one or more.” The term “some” refers to one or more. Underlined and/or italicized headings and subheadings are used for convenience only, do not limit the scope of the various embodiments, and are not referred to in connection with the interpretation of the description of the embodiment. All structural and functional equivalents to the elements of the various embodiments of the technology described throughout this disclosure that are known or later come to be known to those of ordinary skill in the art are expressly incorporated herein by reference and intended to be encompassed by the technology disclosed. Moreover, nothing disclosed herein is intended to be dedicated to the public regardless of whether such disclosure is explicitly recited in the above description.
Number | Name | Date | Kind |
---|---|---|---|
4453074 | Weinstein et al. | Jun 1984 | A |
4582985 | Loefberg | Apr 1986 | A |
4725719 | Oncken et al. | Feb 1988 | A |
4747147 | Sparrow | May 1988 | A |
4910521 | Mellon | Mar 1990 | A |
4993068 | Piosenka et al. | Feb 1991 | A |
5175416 | Mansvelt et al. | Dec 1992 | A |
5180901 | Hiramatsu | Jan 1993 | A |
5180902 | Schick et al. | Jan 1993 | A |
5193114 | Moseley et al. | Mar 1993 | A |
5245329 | Gokcebay | Sep 1993 | A |
5259649 | Shomron | Nov 1993 | A |
5321751 | Ray et al. | Jun 1994 | A |
5438184 | Roberts et al. | Aug 1995 | A |
5461217 | Claus et al. | Oct 1995 | A |
5513272 | Bogosian et al. | Apr 1996 | A |
5521363 | Tannenbaum | May 1996 | A |
5521966 | Friedes et al. | May 1996 | A |
5534857 | Laing et al. | Jul 1996 | A |
5539825 | Akiyama et al. | Jul 1996 | A |
5541985 | Ishii | Jul 1996 | A |
5559504 | Itsumi et al. | Sep 1996 | A |
5559887 | Davis et al. | Sep 1996 | A |
5577121 | Davis et al. | Nov 1996 | A |
5578808 | Taylor et al. | Nov 1996 | A |
5581630 | Bonneau et al. | Dec 1996 | A |
5590038 | Pitroda | Dec 1996 | A |
5590197 | Chen et al. | Dec 1996 | A |
5602918 | Chen et al. | Feb 1997 | A |
5604801 | Dolan et al. | Feb 1997 | A |
5613001 | Bakhoum | Mar 1997 | A |
5677953 | Dolphin | Oct 1997 | A |
5703753 | Mok | Dec 1997 | A |
5721781 | Deo et al. | Feb 1998 | A |
5737439 | Lapsley et al. | Apr 1998 | A |
5739512 | Tognazzini | Apr 1998 | A |
5742756 | Dillaway et al. | Apr 1998 | A |
5742845 | Wagner | Apr 1998 | A |
5757917 | Rose et al. | May 1998 | A |
5764789 | Pare, Jr. et al. | Jun 1998 | A |
5778173 | Apte et al. | Jul 1998 | A |
5796831 | Paradinas et al. | Aug 1998 | A |
5799087 | Rosen | Aug 1998 | A |
5806045 | Biorge et al. | Sep 1998 | A |
5815252 | Price et al. | Sep 1998 | A |
5815657 | Williams et al. | Sep 1998 | A |
5826241 | Stein et al. | Oct 1998 | A |
5826243 | Musmanno et al. | Oct 1998 | A |
5835894 | Adcock et al. | Nov 1998 | A |
5838818 | Herley et al. | Nov 1998 | A |
5857079 | Claus et al. | Jan 1999 | A |
5869822 | Meadows et al. | Feb 1999 | A |
5875432 | Sehr | Feb 1999 | A |
5884271 | Pitroda | Mar 1999 | A |
5884292 | Baker et al. | Mar 1999 | A |
5889941 | Tushie | Mar 1999 | A |
5892211 | Davis et al. | Apr 1999 | A |
5898838 | Wagner | Apr 1999 | A |
5901239 | Kamei | May 1999 | A |
5905908 | Wagner | May 1999 | A |
5907620 | Klemba et al. | May 1999 | A |
5912446 | Wong et al. | Jun 1999 | A |
5915973 | Hoehn et al. | Jun 1999 | A |
5917913 | Wang et al. | Jun 1999 | A |
5917925 | Moore et al. | Jun 1999 | A |
5920058 | Weber et al. | Jul 1999 | A |
5920629 | Rosen | Jul 1999 | A |
5920847 | Kolling et al. | Jul 1999 | A |
5930767 | Reber et al. | Jul 1999 | A |
5931917 | Nguyen et al. | Aug 1999 | A |
5936226 | Aucsmith | Aug 1999 | A |
5942761 | Tuli | Aug 1999 | A |
5978495 | Thomopoulos | Nov 1999 | A |
5987155 | Dunn et al. | Nov 1999 | A |
5988497 | Wallace et al. | Nov 1999 | A |
5991411 | Kaufman | Nov 1999 | A |
5995014 | DiMaria | Nov 1999 | A |
6012039 | Hoffman et al. | Jan 2000 | A |
6012636 | Smith et al. | Jan 2000 | A |
6016476 | Maes et al. | Jan 2000 | A |
6018739 | McCoy et al. | Jan 2000 | A |
6041410 | Shi et al. | Mar 2000 | A |
6047281 | Wilson et al. | Apr 2000 | A |
6047282 | Wilson et al. | Apr 2000 | A |
6060815 | Nysen | May 2000 | A |
6070159 | Wilson et al. | May 2000 | A |
6091835 | Smithies et al. | Jul 2000 | A |
6095413 | Tetro et al. | Aug 2000 | A |
6101477 | Hohle et al. | Aug 2000 | A |
6104311 | Lastinger | Aug 2000 | A |
6104922 | Baumann et al. | Aug 2000 | A |
6116736 | Stark et al. | Sep 2000 | A |
6120461 | Smyth | Sep 2000 | A |
6130623 | MacLellan et al. | Oct 2000 | A |
6148093 | McConnell et al. | Nov 2000 | A |
6154879 | Pare, Jr. et al. | Nov 2000 | A |
6175656 | Hoang | Jan 2001 | B1 |
6182892 | Angelo et al. | Feb 2001 | B1 |
6199079 | Gupta et al. | Mar 2001 | B1 |
6199762 | Hohle | Mar 2001 | B1 |
6219639 | Bakis et al. | Apr 2001 | B1 |
6223984 | Renner et al. | May 2001 | B1 |
6233348 | Fujii et al. | May 2001 | B1 |
6256690 | Carper | Jul 2001 | B1 |
6257486 | Teicher et al. | Jul 2001 | B1 |
6257620 | Kenney | Jul 2001 | B1 |
6263446 | Kausik et al. | Jul 2001 | B1 |
6265977 | Vega et al. | Jul 2001 | B1 |
6268788 | Gray | Jul 2001 | B1 |
6269348 | Pare, Jr. et al. | Jul 2001 | B1 |
6270011 | Gottfried | Aug 2001 | B1 |
6272562 | Scott et al. | Aug 2001 | B1 |
6282649 | Lambert | Aug 2001 | B1 |
6298146 | Ilan et al. | Oct 2001 | B1 |
6307956 | Black | Oct 2001 | B1 |
6325285 | Baratelli | Dec 2001 | B1 |
6327578 | Linehan | Dec 2001 | B1 |
6332193 | Glass et al. | Dec 2001 | B1 |
6338048 | Mori | Jan 2002 | B1 |
6338435 | Carper | Jan 2002 | B1 |
6345761 | Seelbach et al. | Feb 2002 | B1 |
6357663 | Takahashi et al. | Mar 2002 | B1 |
6360953 | Lin | Mar 2002 | B1 |
6390374 | Carper et al. | May 2002 | B1 |
6424249 | Houvener | Jul 2002 | B1 |
6442286 | Kramer | Aug 2002 | B1 |
6446862 | Mann | Sep 2002 | B1 |
6480825 | Sharma et al. | Nov 2002 | B1 |
6480935 | Carper et al. | Nov 2002 | B1 |
6483929 | Murakami et al. | Nov 2002 | B1 |
6483932 | Martinez et al. | Nov 2002 | B1 |
6490443 | Freeny, Jr. | Dec 2002 | B1 |
6496594 | Prokoski | Dec 2002 | B1 |
6507662 | Brooks | Jan 2003 | B1 |
6519565 | Clements et al. | Feb 2003 | B1 |
6539101 | Black | Mar 2003 | B1 |
6560581 | Fox et al. | May 2003 | B1 |
6588660 | Buescher et al. | Jul 2003 | B1 |
6588673 | Chan et al. | Jul 2003 | B1 |
6591249 | Zoka | Jul 2003 | B2 |
6601759 | Fife et al. | Aug 2003 | B2 |
6601762 | Piotrowski | Aug 2003 | B2 |
6609656 | Elledge | Aug 2003 | B1 |
6615191 | Seeley | Sep 2003 | B1 |
6628813 | Scott et al. | Sep 2003 | B2 |
6629591 | Griswold et al. | Oct 2003 | B1 |
6631201 | Dickinson et al. | Oct 2003 | B1 |
6636620 | Hoshino | Oct 2003 | B1 |
6655585 | Shinn | Dec 2003 | B2 |
6657614 | Ito et al. | Dec 2003 | B1 |
6658164 | Irving et al. | Dec 2003 | B1 |
6662166 | Pare, Jr. et al. | Dec 2003 | B2 |
6669086 | Abdi et al. | Dec 2003 | B2 |
6681328 | Harris et al. | Jan 2004 | B1 |
6687391 | Scott et al. | Feb 2004 | B1 |
6697947 | Matyas, Jr. et al. | Feb 2004 | B1 |
6703918 | Kita | Mar 2004 | B1 |
6719200 | Wiebe | Apr 2004 | B1 |
6732919 | Macklin et al. | May 2004 | B2 |
6734887 | Field | May 2004 | B2 |
6744909 | Kostrzewski et al. | Jun 2004 | B1 |
6744910 | McClurg et al. | Jun 2004 | B1 |
6765470 | Shinzaki | Jul 2004 | B2 |
6776332 | Allen et al. | Aug 2004 | B2 |
6799726 | Stockhammer | Oct 2004 | B2 |
6816058 | McGregor et al. | Nov 2004 | B2 |
6819219 | Bolle et al. | Nov 2004 | B1 |
6826000 | Lee et al. | Nov 2004 | B2 |
6828299 | Yang et al. | Dec 2004 | B2 |
6828960 | Parry | Dec 2004 | B2 |
6834795 | Rasmussen et al. | Dec 2004 | B1 |
6867850 | McClurg | Mar 2005 | B2 |
6870946 | Teng | Mar 2005 | B1 |
6873974 | Schutzer | Mar 2005 | B1 |
6877097 | Hamid et al. | Apr 2005 | B2 |
6886104 | McClurg et al. | Apr 2005 | B1 |
6892940 | Kocarev et al. | May 2005 | B2 |
6901154 | Dunn | May 2005 | B2 |
6914517 | Kinsella | Jul 2005 | B2 |
6917695 | Teng et al. | Jul 2005 | B2 |
6925439 | Pitroda | Aug 2005 | B1 |
6925565 | Black | Aug 2005 | B2 |
6928181 | Brooks | Aug 2005 | B2 |
6928195 | Scott et al. | Aug 2005 | B2 |
6929413 | Schofield | Aug 2005 | B2 |
6931538 | Sawaguchi | Aug 2005 | B1 |
6934861 | Haala | Aug 2005 | B2 |
6944768 | Siegel et al. | Sep 2005 | B2 |
6954260 | Arnold et al. | Oct 2005 | B2 |
6968453 | Doyle et al. | Nov 2005 | B2 |
6970582 | Langley | Nov 2005 | B2 |
6971031 | Haala | Nov 2005 | B2 |
6983062 | Smith | Jan 2006 | B2 |
6988665 | Schofield | Jan 2006 | B2 |
6996259 | Cannon et al. | Feb 2006 | B2 |
7010148 | Irving et al. | Mar 2006 | B2 |
7028893 | Goodman et al. | Apr 2006 | B2 |
7049962 | Atherton et al. | May 2006 | B2 |
7051925 | Schwarz, Jr. | May 2006 | B2 |
7059159 | Lanigan et al. | Jun 2006 | B2 |
7059531 | Beenau et al. | Jun 2006 | B2 |
7068822 | Scott | Jun 2006 | B2 |
7073711 | Fernandez et al. | Jul 2006 | B2 |
7079007 | Siegel et al. | Jul 2006 | B2 |
7095880 | Martinez et al. | Aug 2006 | B2 |
7102523 | Shanks et al. | Sep 2006 | B2 |
7103201 | Scott et al. | Sep 2006 | B2 |
7127088 | Grajewski et al. | Oct 2006 | B1 |
7132946 | Waldner et al. | Nov 2006 | B2 |
7155039 | Lo | Dec 2006 | B1 |
7162060 | Barton et al. | Jan 2007 | B1 |
7164440 | Cannon | Jan 2007 | B2 |
7165716 | Mödl et al. | Jan 2007 | B1 |
7171662 | Misra et al. | Jan 2007 | B1 |
7181017 | Nagel et al. | Feb 2007 | B1 |
7203344 | McClurg et al. | Apr 2007 | B2 |
7218202 | Bacchiaz et al. | May 2007 | B2 |
7239227 | Gupta et al. | Jul 2007 | B1 |
7266848 | Moyer et al. | Sep 2007 | B2 |
7271881 | Arnold et al. | Sep 2007 | B2 |
7278025 | Saito et al. | Oct 2007 | B2 |
7289649 | Walley et al. | Oct 2007 | B1 |
7303120 | Beenau et al. | Dec 2007 | B2 |
7305563 | Bacchiaz et al. | Dec 2007 | B2 |
7308122 | McClurg et al. | Dec 2007 | B2 |
7314164 | Bonalle et al. | Jan 2008 | B2 |
7314165 | Bonalle et al. | Jan 2008 | B2 |
7319565 | Arnold et al. | Jan 2008 | B2 |
7325724 | Bonalle et al. | Feb 2008 | B2 |
7364071 | Esplin | Apr 2008 | B2 |
7466348 | Morikawa et al. | Dec 2008 | B2 |
7506172 | Bhakta | Mar 2009 | B2 |
7543337 | D'Agnolo | Jun 2009 | B2 |
7724137 | Page | May 2010 | B2 |
7730526 | Lamplough | Jun 2010 | B2 |
7751593 | Hombo | Jul 2010 | B2 |
7938329 | Tran | May 2011 | B2 |
7946501 | Borracci | May 2011 | B2 |
7992789 | Borracci | Aug 2011 | B2 |
8045956 | Sun | Oct 2011 | B2 |
8095519 | Delia | Jan 2012 | B2 |
8186580 | Cannon et al. | May 2012 | B2 |
8253531 | Davis et al. | Aug 2012 | B2 |
8275353 | Sun | Sep 2012 | B2 |
8276816 | Gardner | Oct 2012 | B2 |
8307207 | Bacchiaz et al. | Nov 2012 | B2 |
8360322 | Bonalle et al. | Jan 2013 | B2 |
8485442 | McNeal | Jul 2013 | B2 |
8490872 | Kim | Jul 2013 | B2 |
8499164 | Ortiz et al. | Jul 2013 | B2 |
8553251 | Iizuka | Oct 2013 | B2 |
8572395 | Ito | Oct 2013 | B2 |
8598981 | Idsøe et al. | Dec 2013 | B2 |
8607063 | Ikeuchi | Dec 2013 | B2 |
8708230 | Cannon et al. | Apr 2014 | B2 |
8713660 | Carper | Apr 2014 | B2 |
8756680 | Shashidhar | Jun 2014 | B2 |
8782427 | Fedronic et al. | Jul 2014 | B2 |
8783578 | Kim | Jul 2014 | B2 |
8786033 | Saito | Jul 2014 | B2 |
8799167 | Carper | Aug 2014 | B2 |
20010049785 | Kawan | Dec 2001 | A1 |
20020059523 | Bacchiaz et al. | May 2002 | A1 |
20020095587 | Doyle et al. | Jul 2002 | A1 |
20020153424 | Li | Oct 2002 | A1 |
20030046554 | Leydier | Mar 2003 | A1 |
20030159044 | Doyle | Aug 2003 | A1 |
20040039909 | Cheng | Feb 2004 | A1 |
20040129787 | Saito et al. | Jul 2004 | A1 |
20040266267 | Inaba | Dec 2004 | A1 |
20050035200 | Hendrick | Feb 2005 | A1 |
20050125674 | Nishiki | Jun 2005 | A1 |
20050139685 | Kozlay | Jun 2005 | A1 |
20050144354 | Murashita | Jun 2005 | A1 |
20050161503 | Remery | Jul 2005 | A1 |
20050182947 | Bacchiaz et al. | Aug 2005 | A1 |
20050240778 | Saito | Oct 2005 | A1 |
20060032905 | Bear | Feb 2006 | A1 |
20060070114 | Wood | Mar 2006 | A1 |
20060113381 | Hochstein | Jun 2006 | A1 |
20060161789 | Doughty | Jul 2006 | A1 |
20060208066 | Finn | Sep 2006 | A1 |
20070033150 | Nwosu | Feb 2007 | A1 |
20070043594 | Lavergne | Feb 2007 | A1 |
20070073619 | Smith | Mar 2007 | A1 |
20070124536 | Carper | May 2007 | A1 |
20070154018 | Watanabe | Jul 2007 | A1 |
20070186106 | Ting | Aug 2007 | A1 |
20070194131 | Brown | Aug 2007 | A1 |
20070220273 | Campisi | Sep 2007 | A1 |
20070251997 | Brown | Nov 2007 | A1 |
20080005425 | Saito | Jan 2008 | A1 |
20080016370 | Libin | Jan 2008 | A1 |
20080019578 | Saito et al. | Jan 2008 | A1 |
20080040615 | Carper et al. | Feb 2008 | A1 |
20080054875 | Saito | Mar 2008 | A1 |
20080072065 | Bonalle et al. | Mar 2008 | A1 |
20080097924 | Carper et al. | Apr 2008 | A1 |
20080126260 | Cox | May 2008 | A1 |
20080148059 | Shapiro | Jun 2008 | A1 |
20080164325 | Borracci | Jul 2008 | A1 |
20080201658 | Saito et al. | Aug 2008 | A1 |
20080223921 | Salazar et al. | Sep 2008 | A1 |
20080223925 | Saito et al. | Sep 2008 | A1 |
20080230613 | Leibenguth | Sep 2008 | A1 |
20080282334 | Yves | Nov 2008 | A1 |
20090084858 | Borracci | Apr 2009 | A1 |
20090094125 | Killian et al. | Apr 2009 | A1 |
20090313493 | Ide | Dec 2009 | A1 |
20090322477 | Celorio | Dec 2009 | A1 |
20100039234 | Soliven et al. | Feb 2010 | A1 |
20100080425 | Bebis | Apr 2010 | A1 |
20100148312 | Jung | Jun 2010 | A1 |
20100153451 | Delia | Jun 2010 | A1 |
20100161488 | Evans | Jun 2010 | A1 |
20100215224 | Saito | Aug 2010 | A1 |
20100257359 | Currie | Oct 2010 | A1 |
20100260388 | Garrett | Oct 2010 | A1 |
20100275259 | Adams | Oct 2010 | A1 |
20110238540 | Carrington | Sep 2011 | A1 |
20110256832 | Park | Oct 2011 | A1 |
20120016798 | Carper | Jan 2012 | A1 |
20120022957 | Sun | Jan 2012 | A1 |
20120079273 | Bacchiaz et al. | Mar 2012 | A1 |
20120120013 | Kurz | May 2012 | A1 |
20120218079 | Kim | Aug 2012 | A1 |
20120241524 | Blot et al. | Sep 2012 | A1 |
20120297467 | Carper | Nov 2012 | A1 |
20120313754 | Bona | Dec 2012 | A1 |
20130026230 | Cannon et al. | Jan 2013 | A1 |
20130036463 | Shashidhar | Feb 2013 | A1 |
20130056540 | Blot et al. | Mar 2013 | A1 |
20130080788 | Bacchiaz et al. | Mar 2013 | A1 |
20130290136 | Sheets | Oct 2013 | A1 |
20140006277 | Rao | Jan 2014 | A1 |
20140046785 | Jenkins | Feb 2014 | A1 |
20140232526 | Carper | Aug 2014 | A1 |
20140251997 | Bitton | Sep 2014 | A1 |
20150067348 | Webber | Mar 2015 | A1 |
20150127553 | Sundaram | May 2015 | A1 |
20150262170 | Bouda | Sep 2015 | A1 |
20150379033 | Agarwal | Dec 2015 | A1 |
20160191512 | Tatourian | Jun 2016 | A1 |
20170170513 | Sakamoto | Jun 2017 | A1 |
20170323130 | Dickinson | Nov 2017 | A1 |
Number | Date | Country |
---|---|---|
200238203 | Nov 2002 | AU |
757159 | Feb 2003 | AU |
2003274967 | Apr 2004 | AU |
2004218720 | Nov 2004 | AU |
784438 | Apr 2006 | AU |
2006311596 | May 2007 | AU |
2007229728 | Oct 2007 | AU |
2010224455 | Jan 2011 | AU |
2346592 | Nov 2001 | CA |
2498288 | Mar 2004 | CA |
2564707 | Nov 2005 | CA |
2629435 | May 2007 | CA |
2748563 | Mar 2012 | CA |
2844003 | Feb 2013 | CA |
60111892 | Aug 2005 | DE |
10393215 | Sep 2005 | DE |
994439 | Apr 2000 | EP |
1256908 | Nov 2002 | EP |
1418486 | May 2004 | EP |
1537526 | Jun 2005 | EP |
1157906 | Jul 2005 | EP |
1647942 | Apr 2006 | EP |
1716660 | Nov 2006 | EP |
1759337 | Mar 2007 | EP |
1840788 | Oct 2007 | EP |
1924976 | May 2008 | EP |
1952244 | Aug 2008 | EP |
2290625 | Mar 2011 | EP |
2434462 | Mar 2012 | EP |
2569735 | Mar 2013 | EP |
2953619 | Jun 2011 | FR |
2959847 | Nov 2011 | FR |
2473283 | Mar 2011 | GB |
02088859 | Mar 1990 | JP |
H0288859 | Mar 1990 | JP |
02118790 | May 1990 | JP |
11039483 | Feb 1999 | JP |
2001250064 | Sep 2001 | JP |
2001323691 | Nov 2001 | JP |
2002183706 | Jun 2002 | JP |
2005242650 | Sep 2005 | JP |
2005326995 | Nov 2005 | JP |
2006257871 | Sep 2006 | JP |
200748118 | Feb 2007 | JP |
2007048118 | Feb 2007 | JP |
2007058649 | Mar 2007 | JP |
2007156785 | Jun 2007 | JP |
2008078820 | Apr 2008 | JP |
2010262586 | Nov 2010 | JP |
2011090686 | May 2011 | JP |
2012074011 | Apr 2012 | JP |
20030042639 | Jun 2003 | KR |
9718653 | May 1997 | WO |
2001016707 | Mar 2001 | WO |
2001016759 | Mar 2001 | WO |
2001016865 | Mar 2001 | WO |
2001016873 | Mar 2001 | WO |
2001016874 | Mar 2001 | WO |
2001039427 | Mar 2001 | WO |
2004025545 | Mar 2004 | WO |
2005104704 | Nov 2005 | WO |
2006102625 | Sep 2006 | WO |
2007022423 | Feb 2007 | WO |
2007056476 | May 2007 | WO |
2007064429 | Jun 2007 | WO |
2007143670 | Dec 2007 | WO |
2007146681 | Dec 2007 | WO |
2008010899 | Jan 2008 | WO |
2008079491 | Jul 2008 | WO |
2010019961 | Feb 2010 | WO |
2010077999 | Jul 2010 | WO |
2010133469 | Nov 2010 | WO |
2010133496 | Nov 2010 | WO |
2011067543 | Jun 2011 | WO |
2011141659 | Nov 2011 | WO |
Entry |
---|
Jung, Stefan, “A Low-Power and High-Performance CMOS Fingerprint Sensing and Encoding Architecture,” IEEE Journal of Solid-State Circuits, Jul. 1999, pp. 978-984, vol. 34, No. 7. |
Noore, Afzel, “Highly Robust Biometric Smart Card Design,” IEEE Transactions on Consumer Electronics, Nov. 2000, pp. 1059-1063, vol. 46, No. 4. |
Sanchez-Reillo, Raul, et al., “Fingerprint Verification Using Smart Cards for Access Control Systems,” 2001, pp. 250-253. |
Sanchez-Reillo, Raul, et al., “Microprocessor Smart Cards with Fingerprint User Authorization,” IEEE AESS Systems Magazine, Mar. 2003, pp. 22-24. |
Sung, Bum Pan, et al., “An Ultra-Low Memory Fingerprint Matching Algorithm and Its Implementation on a 32-bit Smart Card,” IEEE, Mar. 26, 2003, pp. 453-459. |
Kim, Dong-Sun, “On the Design of an Embedded Biometric Smart Card Reader,” IEEE, Apr. 16, 2008, pp. 573-577. |
Kim, Seong-Jin, “A CMOS Fingerprint System-on-a-Chip With Adaptable Pixel Networks and Column-Parallel Processors for Image Enhancement and Recognition,” IEEE Journal of Solid-State Circuits, Nov. 2008, pp. 2558-2567, vol. 43, No. 11. |
Nixon, Jenny, “Reconciling your Quicken Account with the Bank Statement,” University of Nebraska, Lincoln, 2005. |
“Biometric Technology for Secure Access,” Sep. 18, 2007, Biometric Associates, Inc., Baltimore, MD, USA. |
Patent Cooperation Treaty, International Search Report for PCT/US2016/000026, May 6, 2016, pp. 4-5. |
Patent Cooperation Treaty, International Search Report for PCT/US2016/000020, May 12, 2016, pp. 4-5. |
Anonymous: “ISO/IEC 7816-3 Identification cards—Integrated circuit cards—Part 3: Cards with contacts—Electrical interface and transmission protocols”, Nov. 1, 2006 (Nov. 1, 2006), XP055438640, Retrieved from the Internet: URL:http://read.pudn.com/downloads132/doc/comm/563504/ISO-IEC 7816/ISO+IEC7816-3-2006.pdf [retrieved on Jan. 8, 2018]. |
Patent Cooperation Treaty, International Search Report for PCT/IB2016/000048, dated Apr. 15, 2016, p. 5. |
ISO 7816 Part 3: Electronic Signals and Transmission Protocols, www.cardwerk.com/smartcards/smartcard_standard_IS07816-3.aspx, Jan. 12, 2015 (11 pages). |
John Fenske, “Biometrics Move to Smart Cards and Smartphones for Access Control”, John Fenske, Jul. 30, 2013 (4 pages). |
Patent Cooperation Treaty, International Search Report for PCT/IB2016/000324, dated Oct. 18, 2016, pp. 4-5. |
Patent Cooperation Treaty, International Preliminary Report on Patentability PCT/IB2016/000020, dated Jul. 18, 2017, p. 4. |
Patent Cooperation Treaty, International Preliminary Report on Patentability for PCT/IB2016/000048, dated Apr. 26, 2016, p. 4. |
Patent Cooperation Treaty, International Search Report for PCT/IB2016/00093, dated Sep. 5, 2017, p. 7. |
Patent Cooperation Treaty, International Preliminary Report on Patentability for PCT/IB2016/000093, dated Sep. 26, 2017, p. 4. |
Patent Cooperation Treaty, International Preliminary Report on Patentability for PCT/IB2016/000026, dated Jul. 18, 2017, p. 4. |
Patent Cooperation Treaty, International Preliminary Report on Patentability for PCT/IB2016/000324, dated Sep. 26, 2017, p. 4. |
Patent Cooperation Treaty, International Preliminary Report on Patentability for PCT/IB2016/000048, dated Jul. 25, 2017, p. 4. |
Patent Cooperation Treaty, International Search Report for PCT/IB2016/00020, dated May 24, 2017, pp. 2-3. |
Number | Date | Country | |
---|---|---|---|
20160203481 A1 | Jul 2016 | US |