The present disclosure is generally related to secure electronic authentication, and more specifically to a graphics processing unit based device signature generation for providing a user device authentication.
As device manufactures continue to restrict access to information specific to a device configuration and operation, it has become increasingly difficult to generate unique device identifiers that may be persistently associated with a particular device initiating a secure electronic transaction. These unique features can be used to validate a device in consecutive authentication transactions. Blocking of access to device-specific data impedes the integration of device fingerprint data, for reliable identification of a source device as a verification factor, in user authentication systems and processes thus hampering efforts for enhancing access verification security by associating a device to previous authentication transactions for a specific user.
These and other deficiencies exist Therefore, there exists a need for a device signature and/or fingerprint computation system and process that is both accessible and can be readily integrated into a user authentication process.
Embodiments of the present disclosure provide a system, method, and non-transitory computer-accessible medium having stored thereon computer-executable instructions for implementing a device binding authentication system and process. In some aspects, the techniques described herein relate to a method for enhancing one time password (OTP) card authentication based on computation of a digital signature associated with operation of a graphics processing unit (GPU) of a mobile and/or computing device and providing the computed GPU-based device fingerprint as authentication data for validating a transaction-initiating source device and/or a transacting user's identity. The method includes: receiving an authentication message, via a near field communication (NFC) transmission, by a mobile device from a contactless card, the authentication message, corresponding to a user authentication request, being operative to provide raw image data associated with an image, to a mobile browser running on the mobile device; rendering, by the mobile browser, the image associated with raw image data, using a web graphics library (WebGL) application programming interface (API); generating an image hash identifier from rendered image data generated by the mobile browser using the WebGL API, the image hash identifier corresponding to the user authentication request; mapping the image hash identifier with a graphics processing unit (GPU) associated with the mobile device, for binding the mobile device to the authentication message provided by the NFC transmission from the contactless card; comparing, by an authentication server, the image hash identifier received from the mobile device, to one or more previously stored hash identifiers associated with one or more previous user authentication requests; verifying, by the authentication server, the mobile device based on determining a match between the image hash identifier received from the mobile device in response to the user authentication request, and the one or more previously stored hash identifiers associated with the one or more previous user authentication request.
In some aspects, the techniques described herein relate to a method, wherein the authentication message include a uniform resource locator (URL) pointing to the image, the image being hosted on a web server, and the mobile device, responsive to receiving the URL, being operative to retrieve raw image data from the web server. The raw image data associated with the image may be retrieved from the web server through a URL redirection. In some embodiments, the URL may include embedded instructions for redirecting to multiple images to be periodically rotated, the multiple images being stored on the web server. Alternatively, the multiple images may be stored on one or more distinct web servers.
In some aspects, the techniques described herein relate to a method, wherein raw image data is stored in an near field communication data exchange format (NDEF) file on the contactless card, the NDEF file further including an image identifier corresponding to a multipurpose internet mail extensions (MIME) media type of the image for facilitating the rendering of the image by the mobile browser having a web graphics library (WebGL) application programming interface (API). The NDEF file may be directly transmitted to the mobile device for rendering, via the NFC transmission from the contactless card. With respect to the aforementioned scenario, NFC transmission of the authentication message may be initiated by conducting an NFC read of the contactless card by a NFC reader application, running on the mobile device.
In some embodiment, the raw image data may be directly read from the contactless card by a website via web near filed communication (WebNFC) and transmitted, via a network connection, from a web server hosting the WebNFC-enabled website, to a mobile browser, on the mobile device, for rendering. The raw image data may be associated with a high entropy pattern to exaggerate GPU differences in the rendered output (e.g., the rendered image data). In accordance with some embodiments, the image may be rendered by the mobile browser in a fixed size frame buffer to prevent changes in rendered image data resulting from different screen resolutions.
In some aspects, the techniques described herein relate to a multi-factor authentication system based on integrating device binding functionality with OTP authentication card, the system including a computer hardware arrangement configure to: provide a first image data associated with an image, to a mobile browser running on a mobile device of a user, the first image data received, as part of an authentication message, in response to a user authentication request, from a contactless card associated with the user; render the image from the first image data using a web graphics library (WebGL) functionality associated with the mobile browser, to generated a second image data; generate an image hash identifier from the second image data; map the image hash identifier with a graphics processing unit (GPU) associated with the mobile device to bind the mobile device with the authentication message transmitted from the contactless card; compare, by an authentication server, the image hash identifier received from the mobile device, to one or more previously stored hash identifiers associated with one or more previous user authentication requests; verify, by the authentication server, the mobile device based on determining a match between the image hash identifier received from the mobile device in response to the user authentication request and the one or more previously stored hash identifiers associated with one or more previous user authentication request.
In some aspects, the techniques described herein relate to a system, wherein the system is further configured to encode, into the authentication message, a uniform resource locator (URL) pointing to an image hosted on a web server, the URL directing the mobile browser to retrieve the first image data from the web server. The URL may include embedded instructions for redirecting to multiple images to be periodically rotated, the multiple images being stored on the web server.
In some aspects, the techniques described herein relate to a system, wherein the first image data is stored on the contactless card and transmitted to the mobile device, for rendering, via a NFC transmission from the contactless card, the NFC transmission further including an image identifier corresponding to a multipurpose internet mail extensions (MIME) media type of the image, to facilitate the rendering of the image by the WebGL functionality of the mobile browser.
In accordance with some embodiments, the first image data may correspond to raw image data having a high entropy pattern to exaggerate GPU differences in generating the second image data, the second image data corresponding to rendered image data.
In some aspects, the techniques described herein relate to a non-transitory computer-accessible medium including instructions for execution by a computer hardware arrangement, wherein, upon execution of the instructions the computer hardware arrange is configured to perform procedures including: receiving an authentication message, via a near field communication (NFC) transmission, by a mobile device from a contactless card, the authentication message, corresponding to a user authentication request, being operative to provide raw image data associated with an image, to a mobile browser running on the mobile device; rendering, by the mobile browser, the image associated with raw image data, using a web graphics library (WebGL) application programming interface (API); generating an image hash identifier from rendered image data generated by the mobile browser using the WebGL API, the image hash identifier corresponding to the user authentication request; mapping the image hash identifier with a graphics processing unit (GPU) associated with the mobile device to provide binding between the mobile device and the authentication message provided by the NFC transmission from the contactless card; comparing, by an authentication server, the image hash identifier received from the mobile device, to one or more previously stored hash identifiers associated with one or more previous user authentication requests; verifying, by the authentication server, the mobile device based on determining a match between the image hash identifier received from the mobile device in response to the user authentication request and the one or more previously stored hash identifiers associated with one or more previous user authentication request.
In some aspects, the techniques described herein relate to a non-transitory computer-accessible medium, further including instructions for encoding, into the authentication message, a uniform resource locator (URL) pointing to an image hosted on a web server, the URL directing the mobile browser to retrieve the first image data from the web server. In some embodiments, the non-transitory computer-accessible medium may further include instructions for redirecting to multiple images to be periodically rotated.
In some aspects, the techniques described herein relate to a non-transitory computer-accessible medium, further including instructions for rendering the image directly from the NFC transmission received from the contactless card, the NFC transmission including raw image data and a multipurpose internet mail extensions (MIME) media type associated with the image, and stored on the contactless card.
The following description of embodiments provides non-limiting representative examples referencing numerals to particularly describe features and teachings of different aspects of the invention. The exemplary embodiments described will be recognized as capable of implementation separately, or in combination, with other embodiments from the description of the embodiments and the features and teachings of any embodiment can be interchangeably combined with the features and teachings of any other embodiment. A person of ordinary skill in the art reviewing the description of exemplary embodiments will learn and understand the different described aspects of the invention. The description of exemplary embodiments should facilitate understanding of the invention to such an extent that other implementations, not specifically covered but within the knowledge of a person of skill in the art having read the description of exemplary embodiments, will be understood to be consistent with an application of the invention.
Furthermore, the described features, advantages, and characteristics of the exemplary embodiments may be combined in any suitable manner. A person of ordinary skill in the art will recognize that the exemplary embodiments may be practiced without one or more of the specific features or advantages of an exemplary embodiment. In other instances, additional features and advantages may be recognized in certain exemplary embodiments that may not be present in all exemplary embodiments. One skilled in the art will understand that the described features, advantages, and characteristics of any exemplary embodiment can be interchangeably combined with the features, advantages, and characteristics of any other exemplary embodiment.
One aspect of the proposed system and process is directed to a device binding authentication approach that utilizes a distinct computational flow of a graphics processing unit (GPU) to derive a device signature and/or fingerprint for verifying a source device. More specifically, the invention leverages the NFC based connectivity of cryptographic OTP authentication cards to provide an input image, read by an NFC reader, for processing on a mobile device. The image would correspond to a high entropy pattern to exaggerate GPU differences in the rendered output. The output of the image processing buffer associated with a browser application (equipped with a WebGL API) running on the mobile device, can then be hashed and used as a device identifier for the specific mobile device. The proposed device binding approach can be readily integrated with the cryptographic OTP authentication process to enhance authentication strength of an OTP card authentication signal, by verifying, with high degree of certainty, the identity of the card-reading device.
The proposed solution provides a factor of authentication strength (based on using a GPU-based device signature as a device verification signal) without requiring additional authentication actions by a user. This is of inherent value in secure electronic transaction processing. Furthermore, the inventive process may be operationally integrated with contactless OTP card technology, by leveraging the NFC nature of the encrypted OTP authentication process. This will enhance the strength of the authentication process with a verifiable GPU signature associated with the source device.
In some embodiments, a device signature for facilitating device-binding authentication, may be implemented as a function of the image rendering process associated with a specific GPU (e.g., GPU 116). The image rendering process associated with GPU 116 may be performed on an input image 133 retrieved from an image storing device (e.g., image hosting server 130) As shown in
The Authentication server 110 may include one or more processors 111, and memory 112. Memory 112 may include one or more applications, such as applications 114. According to the exemplary embodiment 100, a device signature verification process 119 may be implemented as part of applications 114 stored on the Authentication server 110. The Authentication server 110 may be in data communication with any number of components of system 100. For example, Authentication server 110 may be configured as a central system, server or platform to control and call various data at different times to execute a plurality of workflow actions such as verification of a device signature 120, computed by the process 102 running on the client device 108 and transmitted to the authentication server for verification. Authentication server 110 may be configured to connect to client device 108 and image hosting device 130. Client device 108 may be in data communication with the applications 114 running the device signature verification process 119. For example, the client device 108 may be in data communication with applications 114 and the image hosting device 130 via one or more networks 106. The Authentication server 110 may transmit, for example from applications 114 executing thereon, one or more requests to client device 108. The one or more requests may be associated with retrieving a device signature 120 from the client device 108. Client device 108 may receive the one or more requests from Authentication server 110. Without limitation, the Authentication server 110 may be a network-enabled computer. As referred to herein, a network-enabled computer may include, but is not limited to a computer device, or communications device including, e.g., a server, a network appliance, a personal computer, a workstation, a phone, a handheld PC, a personal digital assistant, a contactless card, a thin client, a fat client, an Internet browser, a kiosk, a tablet, a terminal, an ATM, or other device. The Authentication server 110 also may be a mobile device; for example, a mobile device may include an iPhone, iPod, iPad from Apple® or any other mobile device running Apple's iOS® operating system, any device running Microsoft's Windows® Mobile operating system, any device running Google's Android® operating system, and/or any other smartphone, tablet, or like wearable mobile device.
The Authentication server 110 may include processing circuitry and may contain additional components, including processors, memories, error and parity/CRC checkers, data encoders, anticollision algorithms, controllers, command decoders, security primitives and tamper-proofing hardware, as necessary to perform the functions described herein. The Authentication server 110 may further include a display and input devices. The display may be any type of device for presenting visual information such as a computer monitor, a flat panel display, and a mobile device screen, including liquid crystal displays, light-emitting diode displays, plasma panels, and cathode ray tube displays. The input devices may include any device for entering information into the authentication server that is available and supported by the authentication server, such as a touch-screen, keyboard, mouse, cursor-control device, touch-screen, microphone, digital camera, video recorder or camcorder. These devices may be used to enter information and interact with the software and other devices described herein.
The information used by the device signature verification process 119 running, for example, on the authentication server 110, may comprise one or more user authentication data (associated with a target user account) provided, via the client device 108, across network 106, and/or one or more stored device signature records (computed based on image 133) and corresponding to previous device authentication attempts initiated from the client device 108 and transmitted to the authentication server 110 across network 106.
In some examples, network 106 may be one or more of a wireless network, a wired network or any combination of wireless network and wired network, and may be configured to connect to any one of components of system 100. For example, the Authentication server 110 may be configured to connect to client device 108 via network 106. In some examples, network 106 may include one or more of a fiber optics network, a passive optical network, a cable network, an Internet network, a satellite network, a wireless local area network (LAN), a Global System for Mobile Communication, a Personal Communication Service, a Personal Area Network, Wireless Application Protocol, Multimedia Messaging Service, Enhanced Messaging Service, Short Message Service, Time Division Multiplexing based systems, Code Division Multiple Access based systems, D-AMPS, Wi-Fi, Fixed Wireless Data, IEEE 802.11b, 802.15.1, 802.11n and 802.11g, Bluetooth, NFC, Radio Frequency Identification (RFID), Wi-Fi, and/or the like.
In addition, network 106 may include, without limitation, telephone lines, fiber optics, IEEE Ethernet 902.3, a wide area network, a wireless personal area network, a LAN, or a global network such as the Internet. In addition, network 106 may support an Internet network, a wireless communication network, a cellular network, or the like, or any combination thereof. Network 106 may further include one network, or any number of the exemplary types of networks mentioned above, operating as a stand-alone network or in cooperation with each other. Network 106 may utilize one or more protocols of one or more network elements to which they are communicatively coupled. Network 106 may translate to or from other protocols to one or more protocols of network devices. Although network 106 is depicted as a single network, it should be appreciated that according to one or more examples, network 106 may comprise a plurality of interconnected networks, such as, for example, the Internet, a service provider's network, a cable television network, corporate networks, such as credit card association networks, and home networks.
As shown in the exemplary system implementation 100, illustrated in
The client device 108 can be in data communication with the image hosting device/server 130 as well as the processor 111 of the authentication server 110. For example, client device 108 can be in data communication with processor 111 of the authentication server 110 via one or more networks 106. The Authentication server 110 may transmit one or more requests to the client device 108. The one or more requests can be associated with retrieving data from the client device 108, and may be generated in response to an authentication request from a source device (e.g., client device 108). The client device 108 can receive the one or more requests from any component of authentication server 110. The client device 108 can be configured to transmit the requested data to the processor 111 of the authentication server 110.
The client device 108 can include a processor 115. The processor 115 can be, for example, one or more microprocessors. The processor 115 can include processing circuitry, which can contain additional components, including additional processors, memories, error and parity/CRC checkers, data encoders, anti-collision algorithms, controllers, command decoders, security primitives and tamper-proofing hardware, as necessary to perform the functions described herein.
The client device 108 may include one or more applications 118 comprising instructions for execution thereon. For example, the application can reside in memory 117 of client device 108 and can comprise instructions for execution on the client device 108. The application 118 of the client device 108 can be in communication with any components of system 100. For example, client device 108 can execute one or more applications that enable, for example, network and/or data communications with one or more components of system 100 and transmit and/or receive data. Without limitation, the client device 108 can be a network-enabled computer. As referred to herein, a network-enabled computer can include, but is not limited to a computer device, or communications device including, e.g., a server, a network appliance, a personal computer, a workstation, a phone, a handheld PC, a personal digital assistant, a contactless card, a thin client, a fat client, an Internet browser, or other device. The functionality associated with the client device 108 may also be implemented on a mobile device; for example, a mobile device can include an iPhone, iPod, iPad from Apple® or any other mobile device running Apple's iOS® operating system, any device running Microsoft's Windows® Mobile operating system, any device running Google's Android® operating system, and/or any other smartphone, tablet, or like wearable mobile device.
The client device 108 can include processing circuitry and can contain additional components, including processors, GPUs, memories, error and parity/CRC checkers, data encoders, anticollision algorithms, controllers, command decoders, security primitives and tamper-proofing hardware, as necessary to perform the functions described herein. The client device 108 can further include a display and input devices. The display can be any type of device for presenting visual information such as a computer monitor, a flat panel display, and a mobile device screen, including liquid crystal displays, light-emitting diode displays, plasma panels, and cathode ray tube displays. The input devices can include any device for entering information into the client device that is available and supported by the client device, such as a touch-screen, keyboard, mouse, cursor-control device, touch-screen, microphone, digital camera, video recorder or camcorder. These devices can be used to enter information and interact with the software and other devices described herein.
System implementation 100 can include one or more databases 109. The one or more databases 109 can comprise a relational database, a non-relational database, or other database implementations, and any combination thereof, including a plurality of relational databases and non-relational databases. In some examples, the databases 109 can comprise a desktop database, a mobile database, or an in-memory database. Further, the one or more databases 109 can be hosted internally by any component of system 100, such as the authentication server 110 and/or the client device 108. The one or more databases 109 can also be hosted externally to any component of the system 100, by a cloud-based platform, or in any storage device that is in data communication with the authentication server 110 and the client device 108. In some examples, the databases 109 can be in data communication with any number of components of system 100. For example, the client device 108 can be configured to retrieve the data requested by processor 111 of the authentication server 110 from the databases 109. Client device 108 can be configured to transmit the received data from databases 109 to the processor 111 via network 106, the received data being responsive to the transmitted one or more requests. In other examples, the processor 111 can be configured to transmit one or more requests for the requested data to the databases 109 via network 106.
An overview of an exemplary mobile browser operations for generating a device fingerprint based on a hashed image identifier is illustrated in
Differences in operating system type and version as well as other software and hardware difference and performance characteristics may result in different computation paths and different set of operations performed by a GPU in rendering an image. This may results in differences in the pixel output associated with the rendition of the image in compressed form. The difference in a pixel output of a GPU may be specially exaggerated if an input image being rendered corresponds to a highly entropic data pattern that is very hard to compress.
In some embodiments information regarding the WebGL version as well as information regarding the operating system version may be extracted based on the specific pixel output of a image rendering process and encoded into a hash identifier computed on the rendered image data. The hash identifier may then serve as a device fingerprint.
The operations of the mobile browser directed at GPU-supplemented rendering of an input image using WebGL API is illustrated in diagram 210. Based on the process illustrated in diagram 210 an image processing signature may be derived and used as a device fingerprint for the computing device (e.g., mobile device 206). As described, the process may be invoked in response to a near field communication (NFC) transmission 202 from the contactless card 204. The NFC transmission 202 may include an authentication message comprising a uniform resource locator (URL) pointing to the image (e.g. raw image data) to be retrieved by the mobile browser 208. In some embodiments the authentication message, transmitted via the NFC transmission 202, may comprise the raw image data stored locally on an NFC tag of the contactless card.
The authentication message transmitted from the contactless card 204 may be received by a NFC reader 210 and passed over to the mobile device 206 for processing. The NFC reader 210 may be integrated into the mobile device 206. In some embodiments, corresponding, for example, to scenarios when a NFC reading application and/or capability is not available on computing and/or mobile device, WebNFC functionality may be encoded in a website to enable direct reading of the contactless card 204 by the website, launched, from example, on a personal computer (PC) terminal. Various embodiments for passing the raw image data 212 to a computing device by utilizing the NFC read capability of contactless (OTP) card 204 are further discussed in relation to
Referring back to
The output of the image rendering process (e.g., rendered image data 218) may be written into a frame buffer 215. The frame buffer 215 may store the rendered image data 218 that can be displayed as a digital image. The content 216 of the fame buffer 215 may then be hashed with a cryptographic hash function 220 to generate an image hash identifier 222. As described earlier, the raw image data 212 may be associated with a high entropy data pattern to exaggerate GPU differences in the rendered output (218). In some embodiments the framebuffer 215 may correspond to a fixed sized buffer in order to prevent changes in rendered image data 218 resulting from different screen resolutions associated with the computing/mobile device 206.
The image rendering process 210, by utilizing a distinct computational flow of the GPU, may generate an output (e.g., rendered image data 218) that possess a unique device-specific signature. Accordingly, hashing the rendered image data provides an hash identifier 222 that may serve as a GPU-based device fingerprint for verifying a source device. The hash identifier 222 (interchangeably referred to as image hash identifier) may then be mapped to the GPU of the mobile device 206 and used as a GPU-based device fingerprint for the mobile device 206. The GPU-based device fingerprint 222 may then be transmitted, for verification, to an authentication server (e.g., back-end authentication server 224) storing one or more user-device fingerprint records 226 associated with previous authentication requests initiated by the contactless card 204 via the mobile device 206. In some embodiments the generated GPU-based device fingerprint may be integrated into operations of the contactless OTP authentication card (e.g., contactless card 204) to add a factor of strength to the OTP card authentication signal.
In some examples, exemplary procedures in accordance with the present disclosure described herein can be performed by a computer hardware arrangement. Such a computer hardware arrangement can be, for example entirely or a part of, or include, but not limited to, a computer and/or processor that can include, for example one or more microprocessors, and use instructions stored on a non-transitory computer-accessible medium (e.g., RAM, ROM, hard drive, or other storage device). For example, a computer-accessible medium can be part of the memory of the systems and devices described herein and/or other computer hardware arrangements.
In some examples, a computer-accessible medium (e.g., as described herein, a storage device such as a hard disk, floppy disk, memory stick, CD-ROM, RAM, ROM, etc., or a combination thereof) can be provided (e.g., in communication with the computer hardware arrangement). The computer-accessible medium can contain executable instructions thereon. In addition or alternatively, a storage arrangement can be provided separately from the computer-accessible medium, which can provide the instructions to the computer hardware arrangement. The instructions can configure the computer hardware arrangement to execute certain exemplary procedures, processes, and methods, as described herein above, for example.
Referring back to
With reference to
In some embodiments, the contactless card 302 may correspond to a uniquely configured OTP contactless card with an integrated processor 331 and a NFC tag 332 storing NFC transmittable user authentication data (readable, for example, by a mobile device with a reader component and running a corresponding application) The contactless card 302) may further comprise a counter 333, also referred to as application transaction counter (ATC), for keeping track of OTP transactions initiated by the contactless card, as well as one or more applets 334 for facilitating the generation of the OTP authentication cryptogram. In some embodiments the transaction counter value may be updated for each OTP transaction initiated by the contactless card.
In some embodiments, the URL may comprise embedded instructions for rendering to multiple images to be periodically rotated. The multiple images may be stored on a designated web server and/or multiple distinct servers.
In some embodiment the WebNFC-enable website 508 may be launched directly on the mobile device 514 to facilitate NFC-based retrieval of image data, via the direct NFC read 507, from the contactless card 504.
As descried above, WebNFC functionality may be encoded in a website to enable direct reading of the contactless card 504 by the WebNFC-enabled website, launched on a computing and/or a mobile device associated with a user. In some embodiment, WebNFC functionality may be encoded in a merchant website to enable direct reading the contactless card 504 by the WebNFC-enabled merchant website, launched on a computing and/or a mobile device associated with a user. The input image data may then be directly read from the contactless card by the merchant web server (via the WebNFC-enabled merchant website) and transmitted to a mobile device associated with a phone number that may be provided by the user initiating the transaction. The image may then be rendered by a mobile browser (using WebGL API) running on the mobile device, and a hash identifier of the rendered image, transmitted back to the merchant webserver. The merchant webserver may then transmit the hash identifier (e.g., device fingerprint) to an authentication server for verification against previous authentications records. If a match is determined, the authentication sever may send a device verification response to the merchant webserver.
Upon retrieval of the raw image data at step 602, the retrieved image data is rendered, using a WebGL process, by a corresponding mobile browser, at step 604. The output of the image rendering process, associated with a specific GPU signature, is then hashed at step 606 to generate an image hash identifier representing a GPU-based device fingerprint. The image hash identifier (e.g., mobile device fingerprint) may then be transmitted to an authentication server for verification at step 608. The Authentication server may be storing records corresponding to previous hash identifiers of the input image associated with previous authentication attempts. The verification process, at step 610, may involve matching the received image hash identifier with one or more previously stored image hash identifiers (e.g., previous authentication records.) In some embodiment, the comparison may involve the most recently stored device fingerprint record. If a positive match is determined at step 610, the mobile device is authenticated as a valid user device, at step 612, and a device-factor authentication may be added to an OTP authentication process associated with the contactless card. If a match is not determined at step 610 a device mismatch notification may be generated at step 614 and transmitted back to a authentication requesting party and/or the transmitting mobile device.
The raw image data retrieved from the hosting server (e.g., authentication server 708 may then be rendered by a client browser application running on the mobile device to generate rendered image data as indicated by operation 717. The content of a framebuffer associated with the output of the image rendering process (e.g., mobile browser's WebGL process) may then be hashed by a cryptographic hash process (e.g., operation 718) to generated an image hash identifier that may server as a GPU-based device signature and/or fingerprint. The image hash identifier is transmitted (as indicated by the transmission 720) to the authentication server 708 for comparison with previously stored image hash identifiers associated with previous device authentication attempts using the mobile device 704.
Upon determining a successful match with one or more previous hash identifier during the verification process 722, the mobile device is verified by the authentication server 708. Following a successful verification of the mobile device 704 by the authentication server 708, a device authentication message 724 may be transmitted to an authentication requesting entity (e.g., merchant server 710) as a standalone device authentication response and/or as part of a multi-factor authentication supplemented with other encrypted user identification data, which may be stored on the contactless card 702 and transmitted to the authentication server for verification along with the device signature (e.g., image hash identifier 720).
Upon determining a successful match with one or more previous hash identifier during the verification process 814, the mobile device is verified by the authentication server 806. Following a successful verification of the mobile device 804 by the authentication server 806, a device authentication message 816 may be transmitted to an authentication requesting entity (e.g., merchant server 808) as a standalone device authentication response and/or as part of a multi-factor authentication supplemented with other encrypted user identification data, which may be stored on the contactless card 802 and transmitted to the authentication server for verification along with the device signature (e.g., image hash identifier 813)
As shown in
Further, the exemplary computer hardware arrangement 905 can be provided with or include an input/output ports 935, which can include, for example a wired network, a wireless network, the internet, an intranet, a data collection probe, a sensor, etc. As shown in
As used herein, the term “card” is not limited to a particular type of card. Rather, it is understood that the term “card” can refer to a contact-based card, a contactless card, or any other card, unless otherwise indicated. It is further understood that the present disclosure is not limited to cards having a certain purpose (e.g., payment cards, gift cards, identification cards, membership cards, transportation cards, access cards), to cards associated with a particular type of account (e.g., a credit account, a debit account, a membership account), or to cards issued by a particular entity (e.g., a commercial entity, a financial institution, a government entity, a social club.) Instead, it is understood that the present disclosure includes cards having any purpose, account association, or issuing entity.
Systems and methods described herein can provide secure, retrieval of sensitive user information or enabling streamlined communication and processing of sensitive user information for example, for facilitating secure electronic transactions. Once a valid authorization response from an authenticated device and/or user has been established, the automated data retrieval and transfer system and process can permit, without limitation, financial transactions (e.g., credit card and debit card transactions), account management transactions (e.g., card refresh, card replacement, and new card addition transactions), membership transactions (e.g., joining and departing transactions), point of access transactions (e.g., building access and secure storage access transactions), transportation transactions (e.g., ticketing and boarding transactions, and other transactions.)
It is further noted that the systems and methods described herein may be tangibly embodied in one or more physical media, such as, but not limited to, a compact disc (CD), a digital versatile disc (DVD), a floppy disk, a hard drive, read only memory (ROM), random access memory (RAM), as well as other physical media capable of data storage. For example, data storage may include random access memory (RAM) and read only memory (ROM), which may be configured to access and store data and information and computer program instructions. Data storage may also include storage media or other suitable type of memory (e.g., such as, for example, RAM, ROM, programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), magnetic disks, optical disks, floppy disks, hard disks, removable cartridges, flash drives), and any type of tangible and non-transitory storage medium, where the files that comprise an operating system, application programs including, for example, web browser application, email application and/or other applications, and data files may be stored. The data storage of the network-enabled computer systems may include electronic information, files, and documents stored in various ways, including, for example, a flat file, indexed file, hierarchical database, relational database, such as a database created and maintained with software from, for example, Oracle® Corporation, Microsoft® Excel file, Microsoft® Access file, a solid state storage device, which may include a flash array, a hybrid array, or a server-side product, enterprise storage, which may include online or cloud storage, or any other storage mechanism. Moreover, the figures illustrate various components (e.g., servers, computers, processors, etc. separately. The functions described as being performed at various components may be performed at other components, and the various components may be combined or separated. Other modifications also may be made.
Computer readable program instructions described herein can be downloaded to respective computing and/or processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing and/or processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing and/or processing device.
Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider. In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, to perform aspects of the present invention.
These computer readable program instructions may be provided to a processor of a general-purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified herein. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the functions specified herein.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions specified herein.
The present disclosure is not to be limited in terms of the particular embodiments described in this application, which are intended as illustrations of various aspects. Many modifications and variations can be made without departing from its spirit and scope, as may be apparent. Functionally equivalent methods and apparatuses within the scope of the disclosure, in addition to those enumerated herein, may be apparent from the foregoing representative descriptions. Such modifications and variations are intended to fall within the scope of the appended representative claims. The present disclosure is to be limited only by the terms of the appended representative claims, along with the full scope of equivalents to which such representative claims are entitled. It is also to be understood that the terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting.
The foregoing description, along with its associated embodiments, has been presented for purposes of illustration only. It is not exhaustive and does not limit the invention to the precise form disclosed. Those skilled in the art may appreciate from the foregoing description that modifications and variations are possible in light of the above teachings or may be acquired from practicing the disclosed embodiments. For example, the steps described need not be performed in the same sequence discussed or with the same degree of separation. Likewise various steps may be omitted, repeated, or combined, as necessary, to achieve the same or similar objectives. Accordingly, the invention is not limited to the above-described embodiments, but instead is defined by the appended claims in light of their full scope of equivalents.
In the preceding specification, various preferred embodiments have been described with references to the accompanying drawings. It may, however, be evident that various modifications and changes may be made thereto, and additional embodiments may be implemented, without departing from the broader scope of the invention as set forth in the claims that follow. The specification and drawings are accordingly to be regarded as an illustrative rather than restrictive sense.
| Number | Name | Date | Kind |
|---|---|---|---|
| 4683553 | Mollier | Jul 1987 | A |
| 4827113 | Rikuna | May 1989 | A |
| 4910773 | Hazard et al. | Mar 1990 | A |
| 5036461 | Elliott et al. | Jul 1991 | A |
| 5363448 | Koopman, Jr. et al. | Nov 1994 | A |
| 5377270 | Koopman, Jr. et al. | Dec 1994 | A |
| 5533126 | Hazard | Jul 1996 | A |
| 5537314 | Kanter | Jul 1996 | A |
| 5592553 | Guski et al. | Jan 1997 | A |
| 5616901 | Crandall | Apr 1997 | A |
| 5666415 | Kaufman | Sep 1997 | A |
| 5764789 | Pare, Jr. et al. | Jun 1998 | A |
| 5768373 | Lohstroh et al. | Jun 1998 | A |
| 5778072 | Samar | Jul 1998 | A |
| 5796827 | Coppersmith et al. | Aug 1998 | A |
| 5832090 | Raspotnik | Nov 1998 | A |
| 5883810 | Franklin et al. | Mar 1999 | A |
| 5901874 | Deters | May 1999 | A |
| 5929413 | Gardner | Jul 1999 | A |
| 5960411 | Hartman et al. | Sep 1999 | A |
| 6021203 | Douceur et al. | Feb 2000 | A |
| 6049328 | Vanderheiden | Apr 2000 | A |
| 6058373 | Blinn et al. | May 2000 | A |
| 6061666 | Do et al. | May 2000 | A |
| 6105013 | Curry et al. | Aug 2000 | A |
| 6199114 | White et al. | Mar 2001 | B1 |
| 6199762 | Hohle | Mar 2001 | B1 |
| 6216227 | Goldstein et al. | Apr 2001 | B1 |
| 6227447 | Campisano | May 2001 | B1 |
| 6282522 | Davis et al. | Aug 2001 | B1 |
| 6324271 | Sawyer et al. | Nov 2001 | B1 |
| 6342844 | Rozin | Jan 2002 | B1 |
| 6367011 | Lee et al. | Apr 2002 | B1 |
| 6402028 | Graham, Jr. et al. | Jun 2002 | B1 |
| 6438550 | Doyle et al. | Aug 2002 | B1 |
| 6501847 | Helot et al. | Dec 2002 | B2 |
| 6631197 | Taenzer | Oct 2003 | B1 |
| 6641050 | Kelley et al. | Nov 2003 | B2 |
| 6655585 | Shinn | Dec 2003 | B2 |
| 6662020 | Aaro et al. | Dec 2003 | B1 |
| 6721706 | Strubbe et al. | Apr 2004 | B1 |
| 6731778 | Oda et al. | May 2004 | B1 |
| 6779115 | Naim | Aug 2004 | B1 |
| 6792533 | Jablon | Sep 2004 | B2 |
| 6829711 | Kwok et al. | Dec 2004 | B1 |
| 6834271 | Hodgson et al. | Dec 2004 | B1 |
| 6834795 | Rasmussen et al. | Dec 2004 | B1 |
| 6852031 | Rowe | Feb 2005 | B1 |
| 6865547 | Brake, Jr. et al. | Mar 2005 | B1 |
| 6873260 | Lancos et al. | Mar 2005 | B2 |
| 6877656 | Jaros et al. | Apr 2005 | B1 |
| 6889198 | Kawan | May 2005 | B2 |
| 6905411 | Nguyen et al. | Jun 2005 | B2 |
| 6910627 | Simpson-Young et al. | Jun 2005 | B1 |
| 6971031 | Haala | Nov 2005 | B2 |
| 6990588 | Yasukura | Jan 2006 | B1 |
| 7006986 | Sines et al. | Feb 2006 | B1 |
| 7085931 | Smith et al. | Aug 2006 | B1 |
| 7127605 | Montgomery et al. | Oct 2006 | B1 |
| 7128274 | Kelley et al. | Oct 2006 | B2 |
| 7140550 | Ramachandran | Nov 2006 | B2 |
| 7152045 | Hoffman | Dec 2006 | B2 |
| 7165727 | de Jong | Jan 2007 | B2 |
| 7175076 | Block et al. | Feb 2007 | B1 |
| 7202773 | Oba et al. | Apr 2007 | B1 |
| 7206806 | Pineau | Apr 2007 | B2 |
| 7232073 | de Jong | Jun 2007 | B1 |
| 7246752 | Brown | Jul 2007 | B2 |
| 7254569 | Goodman et al. | Aug 2007 | B2 |
| 7263507 | Brake, Jr. et al. | Aug 2007 | B1 |
| 7270276 | Vayssiere | Sep 2007 | B2 |
| 7278025 | Saito et al. | Oct 2007 | B2 |
| 7287692 | Patel et al. | Oct 2007 | B1 |
| 7290709 | Tsai et al. | Nov 2007 | B2 |
| 7306143 | Bonneau, Jr. et al. | Dec 2007 | B2 |
| 7319986 | Praisner et al. | Jan 2008 | B2 |
| 7325132 | Takayama et al. | Jan 2008 | B2 |
| 7373515 | Owen et al. | May 2008 | B2 |
| 7374099 | de Jong | May 2008 | B2 |
| 7375616 | Rowse et al. | May 2008 | B2 |
| 7380710 | Brown | Jun 2008 | B2 |
| 7424977 | Smets et al. | Sep 2008 | B2 |
| 7453439 | Kushler et al. | Nov 2008 | B1 |
| 7472829 | Brown | Jan 2009 | B2 |
| 7487357 | Smith et al. | Feb 2009 | B2 |
| 7568631 | Gibbs et al. | Aug 2009 | B2 |
| 7584153 | Brown et al. | Sep 2009 | B2 |
| 7597250 | Finn | Oct 2009 | B2 |
| 7628322 | Holtmanns et al. | Dec 2009 | B2 |
| 7652578 | Braun et al. | Jan 2010 | B2 |
| 7689832 | Talmor et al. | Mar 2010 | B2 |
| 7703142 | Wilson et al. | Apr 2010 | B1 |
| 7748609 | Sachdeva et al. | Jul 2010 | B2 |
| 7748617 | Gray | Jul 2010 | B2 |
| 7748636 | Finn | Jul 2010 | B2 |
| 7762457 | Bonalle et al. | Jul 2010 | B2 |
| 7789302 | Tame | Sep 2010 | B2 |
| 7793851 | Mullen | Sep 2010 | B2 |
| 7796013 | Murakami et al. | Sep 2010 | B2 |
| 7801799 | Brake, Jr. et al. | Sep 2010 | B1 |
| 7801829 | Gray et al. | Sep 2010 | B2 |
| 7805755 | Brown et al. | Sep 2010 | B2 |
| 7809643 | Phillips et al. | Oct 2010 | B2 |
| 7827115 | Weller et al. | Nov 2010 | B2 |
| 7828214 | Narendra et al. | Nov 2010 | B2 |
| 7848746 | Juels | Dec 2010 | B2 |
| 7882553 | Tuliani | Feb 2011 | B2 |
| 7900048 | Andersson | Mar 2011 | B2 |
| 7908216 | Davis et al. | Mar 2011 | B1 |
| 7922082 | Muscato | Apr 2011 | B2 |
| 7933589 | Mamdani et al. | Apr 2011 | B1 |
| 7949559 | Freiberg | May 2011 | B2 |
| 7954716 | Narendra et al. | Jun 2011 | B2 |
| 7954723 | Charrat | Jun 2011 | B2 |
| 7962369 | Rosenberg | Jun 2011 | B2 |
| 7993197 | Mamdani et al. | Aug 2011 | B2 |
| 8005426 | Huomo et al. | Aug 2011 | B2 |
| 8010405 | Bortolin et al. | Aug 2011 | B1 |
| RE42762 | Shin | Sep 2011 | E |
| 8041954 | Plesman | Oct 2011 | B2 |
| 8060012 | Sklovsky et al. | Nov 2011 | B2 |
| 8074877 | Mullen et al. | Dec 2011 | B2 |
| 8082450 | Frey et al. | Dec 2011 | B2 |
| 8095113 | Kean et al. | Jan 2012 | B2 |
| 8099332 | Lemay et al. | Jan 2012 | B2 |
| 8103249 | Markison | Jan 2012 | B2 |
| 8108687 | Ellis et al. | Jan 2012 | B2 |
| 8127143 | Abdallah et al. | Feb 2012 | B2 |
| 8135648 | Oram et al. | Mar 2012 | B2 |
| 8140010 | Symons et al. | Mar 2012 | B2 |
| 8141136 | Lee et al. | Mar 2012 | B2 |
| 8150321 | Winter et al. | Apr 2012 | B2 |
| 8150767 | Wankmueller | Apr 2012 | B2 |
| 8186602 | Itay et al. | May 2012 | B2 |
| 8196131 | von Behren et al. | Jun 2012 | B1 |
| 8215563 | Levy et al. | Jul 2012 | B2 |
| 8224753 | Atef et al. | Jul 2012 | B2 |
| 8232879 | Davis | Jul 2012 | B2 |
| 8233841 | Griffin et al. | Jul 2012 | B2 |
| 8245292 | Buer | Aug 2012 | B2 |
| 8249654 | Zhu | Aug 2012 | B1 |
| 8266451 | Leydier et al. | Sep 2012 | B2 |
| 8285329 | Zhu | Oct 2012 | B1 |
| 8302872 | Mullen | Nov 2012 | B2 |
| 8312519 | Bailey et al. | Nov 2012 | B1 |
| 8316237 | Felsher et al. | Nov 2012 | B1 |
| 8332272 | Fisher | Dec 2012 | B2 |
| 8365988 | Medina, III et al. | Feb 2013 | B1 |
| 8369960 | Tran et al. | Feb 2013 | B2 |
| 8371501 | Hopkins | Feb 2013 | B1 |
| 8381307 | Cimino | Feb 2013 | B2 |
| 8391719 | Alameh et al. | Mar 2013 | B2 |
| 8417231 | Sanding et al. | Apr 2013 | B2 |
| 8439271 | Smets et al. | May 2013 | B2 |
| 8475367 | Yuen et al. | Jul 2013 | B1 |
| 8489112 | Roeding et al. | Jul 2013 | B2 |
| 8511542 | Pan | Aug 2013 | B2 |
| 8559872 | Butler | Oct 2013 | B2 |
| 8566916 | Vernon et al. | Oct 2013 | B1 |
| 8567670 | Stanfield et al. | Oct 2013 | B2 |
| 8572386 | Takekawa et al. | Oct 2013 | B2 |
| 8577810 | Dalit et al. | Nov 2013 | B1 |
| 8583454 | Beraja et al. | Nov 2013 | B2 |
| 8589335 | Smith et al. | Nov 2013 | B2 |
| 8594730 | Bona et al. | Nov 2013 | B2 |
| 8615468 | Varadarajan | Dec 2013 | B2 |
| 8620218 | Awad | Dec 2013 | B2 |
| 8667285 | Coulier et al. | Mar 2014 | B2 |
| 8723941 | Shirbabadi et al. | May 2014 | B1 |
| 8726405 | Bailey et al. | May 2014 | B1 |
| 8740073 | Vijayshankar et al. | Jun 2014 | B2 |
| 8750514 | Gallo et al. | Jun 2014 | B2 |
| 8752189 | De Jong | Jun 2014 | B2 |
| 8794509 | Bishop et al. | Aug 2014 | B2 |
| 8799668 | Cheng | Aug 2014 | B2 |
| 8806592 | Ganesan | Aug 2014 | B2 |
| 8807440 | Von Behren et al. | Aug 2014 | B1 |
| 8811892 | Khan et al. | Aug 2014 | B2 |
| 8814039 | Bishop et al. | Aug 2014 | B2 |
| 8814052 | Bona et al. | Aug 2014 | B2 |
| 8818867 | Baldwin et al. | Aug 2014 | B2 |
| 8850538 | Vernon et al. | Sep 2014 | B1 |
| 8861733 | Benteo et al. | Oct 2014 | B2 |
| 8880027 | Darringer | Nov 2014 | B1 |
| 8888002 | Chesney et al. | Nov 2014 | B2 |
| 8898088 | Springer et al. | Nov 2014 | B2 |
| 8934837 | Zhu et al. | Jan 2015 | B2 |
| 8977569 | Rao | Mar 2015 | B2 |
| 8994498 | Agrafioti et al. | Mar 2015 | B2 |
| 9004365 | Bona et al. | Apr 2015 | B2 |
| 9038894 | Khalid | May 2015 | B2 |
| 9042814 | Royston et al. | May 2015 | B2 |
| 9047531 | Showering et al. | Jun 2015 | B2 |
| 9069976 | Toole et al. | Jun 2015 | B2 |
| 9081948 | Magne | Jul 2015 | B2 |
| 9104853 | Venkataramani et al. | Aug 2015 | B2 |
| 9118663 | Bailey et al. | Aug 2015 | B1 |
| 9122964 | Krawczewicz | Sep 2015 | B2 |
| 9129280 | Bona et al. | Sep 2015 | B2 |
| 9152832 | Royston et al. | Oct 2015 | B2 |
| 9203800 | Izu et al. | Dec 2015 | B2 |
| 9209867 | Royston | Dec 2015 | B2 |
| 9251330 | Boivie et al. | Feb 2016 | B2 |
| 9251518 | Levin et al. | Feb 2016 | B2 |
| 9258715 | Borghei | Feb 2016 | B2 |
| 9270337 | Zhu et al. | Feb 2016 | B2 |
| 9306626 | Hall et al. | Apr 2016 | B2 |
| 9306942 | Bailey et al. | Apr 2016 | B1 |
| 9324066 | Archer et al. | Apr 2016 | B2 |
| 9324067 | Van Os et al. | Apr 2016 | B2 |
| 9332587 | Salahshoor | May 2016 | B2 |
| 9338622 | Bjontegard | May 2016 | B2 |
| 9373141 | Shakkarwar | Jun 2016 | B1 |
| 9379841 | Fine et al. | Jun 2016 | B2 |
| 9413430 | Royston et al. | Aug 2016 | B2 |
| 9413768 | Gregg et al. | Aug 2016 | B1 |
| 9420496 | Indurkar | Aug 2016 | B1 |
| 9426132 | Alikhani | Aug 2016 | B1 |
| 9432339 | Bowness | Aug 2016 | B1 |
| 9455968 | Machani et al. | Sep 2016 | B1 |
| 9473509 | Arsanjani et al. | Oct 2016 | B2 |
| 9491626 | Sharma et al. | Nov 2016 | B2 |
| 9553637 | Yang et al. | Jan 2017 | B2 |
| 9619952 | Zhao et al. | Apr 2017 | B1 |
| 9635000 | Muftic | Apr 2017 | B1 |
| 9665858 | Kumar | May 2017 | B1 |
| 9674705 | Rose et al. | Jun 2017 | B2 |
| 9679286 | Colnot et al. | Jun 2017 | B2 |
| 9680942 | Dimmick | Jun 2017 | B2 |
| 9710804 | Zhou et al. | Jul 2017 | B2 |
| 9740342 | Paulsen et al. | Aug 2017 | B2 |
| 9740988 | Levin et al. | Aug 2017 | B1 |
| 9763097 | Robinson et al. | Sep 2017 | B2 |
| 9767329 | Forster | Sep 2017 | B2 |
| 9769662 | Queru | Sep 2017 | B1 |
| 9773151 | Mil'shtein et al. | Sep 2017 | B2 |
| 9780953 | Gaddam et al. | Oct 2017 | B2 |
| 9891823 | Feng et al. | Feb 2018 | B2 |
| 9940571 | Herrington | Apr 2018 | B1 |
| 9953323 | Candelore et al. | Apr 2018 | B2 |
| 9961194 | Wiechman et al. | May 2018 | B1 |
| 9965756 | Davis et al. | May 2018 | B2 |
| 9965911 | Wishne | May 2018 | B2 |
| 9978058 | Wurmfeld et al. | May 2018 | B2 |
| 10043164 | Dogin et al. | Aug 2018 | B2 |
| 10075437 | Costigan et al. | Sep 2018 | B1 |
| 10129648 | Hernandez et al. | Nov 2018 | B1 |
| 10133979 | Eidam et al. | Nov 2018 | B1 |
| 10217105 | Sangi et al. | Feb 2019 | B1 |
| 10885410 | Rule | Jan 2021 | B1 |
| 11551200 | Cook et al. | Jan 2023 | B1 |
| 20010010723 | Pinkas | Aug 2001 | A1 |
| 20010029485 | Brody et al. | Oct 2001 | A1 |
| 20010034702 | Mockett et al. | Oct 2001 | A1 |
| 20010054003 | Chien et al. | Dec 2001 | A1 |
| 20020078345 | Sandhu et al. | Jun 2002 | A1 |
| 20020093530 | Krothapalli et al. | Jul 2002 | A1 |
| 20020100808 | Norwood et al. | Aug 2002 | A1 |
| 20020120583 | Keresman, III et al. | Aug 2002 | A1 |
| 20020152116 | Yan et al. | Oct 2002 | A1 |
| 20020153424 | Li | Oct 2002 | A1 |
| 20020165827 | Gien et al. | Nov 2002 | A1 |
| 20030023554 | Yap et al. | Jan 2003 | A1 |
| 20030034873 | Chase et al. | Feb 2003 | A1 |
| 20030055727 | Walker et al. | Mar 2003 | A1 |
| 20030078882 | Sukeda et al. | Apr 2003 | A1 |
| 20030167350 | Davis et al. | Sep 2003 | A1 |
| 20030208449 | Diao | Nov 2003 | A1 |
| 20040015958 | Veil et al. | Jan 2004 | A1 |
| 20040039919 | Takayama et al. | Feb 2004 | A1 |
| 20040127256 | Goldthwaite et al. | Jul 2004 | A1 |
| 20040215674 | Odinak et al. | Oct 2004 | A1 |
| 20040230799 | Davis | Nov 2004 | A1 |
| 20050044367 | Gasparini et al. | Feb 2005 | A1 |
| 20050075985 | Cartmell | Apr 2005 | A1 |
| 20050081038 | Arditti Modiano et al. | Apr 2005 | A1 |
| 20050138387 | Lam et al. | Jun 2005 | A1 |
| 20050156026 | Ghosh et al. | Jul 2005 | A1 |
| 20050160049 | Lundholm | Jul 2005 | A1 |
| 20050195975 | Kawakita | Sep 2005 | A1 |
| 20050247797 | Ramachandran | Nov 2005 | A1 |
| 20060006230 | Bear et al. | Jan 2006 | A1 |
| 20060040726 | Szrek et al. | Feb 2006 | A1 |
| 20060041402 | Baker | Feb 2006 | A1 |
| 20060044153 | Dawidowsky | Mar 2006 | A1 |
| 20060047954 | Sachdeva et al. | Mar 2006 | A1 |
| 20060085848 | Aissi et al. | Apr 2006 | A1 |
| 20060136334 | Atkinson et al. | Jun 2006 | A1 |
| 20060173985 | Moore | Aug 2006 | A1 |
| 20060174331 | Schuetz | Aug 2006 | A1 |
| 20060242698 | Inskeep et al. | Oct 2006 | A1 |
| 20060280338 | Rabb | Dec 2006 | A1 |
| 20070033642 | Ganesan et al. | Feb 2007 | A1 |
| 20070055630 | Gauthier et al. | Mar 2007 | A1 |
| 20070061266 | Moore et al. | Mar 2007 | A1 |
| 20070061487 | Moore et al. | Mar 2007 | A1 |
| 20070116292 | Kurita et al. | May 2007 | A1 |
| 20070118745 | Buer | May 2007 | A1 |
| 20070197261 | Humbel | Aug 2007 | A1 |
| 20070224969 | Rao | Sep 2007 | A1 |
| 20070241182 | Buer | Oct 2007 | A1 |
| 20070256134 | Lehtonen et al. | Nov 2007 | A1 |
| 20070258594 | Sandhu et al. | Nov 2007 | A1 |
| 20070278291 | Rans et al. | Dec 2007 | A1 |
| 20080008315 | Fontana et al. | Jan 2008 | A1 |
| 20080011831 | Bonalle et al. | Jan 2008 | A1 |
| 20080014867 | Finn | Jan 2008 | A1 |
| 20080035738 | Mullen | Feb 2008 | A1 |
| 20080071681 | Khalid | Mar 2008 | A1 |
| 20080072303 | Syed | Mar 2008 | A1 |
| 20080086767 | Kulkarni et al. | Apr 2008 | A1 |
| 20080103968 | Bies et al. | May 2008 | A1 |
| 20080109309 | Landau et al. | May 2008 | A1 |
| 20080110983 | Ashfield | May 2008 | A1 |
| 20080120711 | Dispensa | May 2008 | A1 |
| 20080156873 | Wilhelm et al. | Jul 2008 | A1 |
| 20080162312 | Sklovsky et al. | Jul 2008 | A1 |
| 20080164308 | Aaron et al. | Jul 2008 | A1 |
| 20080207307 | Cunningham, II et al. | Aug 2008 | A1 |
| 20080209543 | Aaron | Aug 2008 | A1 |
| 20080223918 | Williams et al. | Sep 2008 | A1 |
| 20080285746 | Landrock et al. | Nov 2008 | A1 |
| 20080308641 | Finn | Dec 2008 | A1 |
| 20090037275 | Pollio | Feb 2009 | A1 |
| 20090048026 | French | Feb 2009 | A1 |
| 20090132417 | Scipioni et al. | May 2009 | A1 |
| 20090143104 | Loh et al. | Jun 2009 | A1 |
| 20090171682 | Dixon et al. | Jul 2009 | A1 |
| 20090210308 | Toomer et al. | Aug 2009 | A1 |
| 20090235339 | Mennes et al. | Sep 2009 | A1 |
| 20090249077 | Gargaro et al. | Oct 2009 | A1 |
| 20090282264 | Amiel et al. | Nov 2009 | A1 |
| 20100023449 | Skowronek et al. | Jan 2010 | A1 |
| 20100023455 | Dispensa et al. | Jan 2010 | A1 |
| 20100029202 | Jolivet et al. | Feb 2010 | A1 |
| 20100033310 | Narendra et al. | Feb 2010 | A1 |
| 20100036769 | Winters et al. | Feb 2010 | A1 |
| 20100078471 | Lin et al. | Apr 2010 | A1 |
| 20100082491 | Rosenblatt et al. | Apr 2010 | A1 |
| 20100094754 | Bertran et al. | Apr 2010 | A1 |
| 20100095130 | Bertran et al. | Apr 2010 | A1 |
| 20100100480 | Altman et al. | Apr 2010 | A1 |
| 20100114731 | Kingston et al. | May 2010 | A1 |
| 20100192230 | Steeves et al. | Jul 2010 | A1 |
| 20100207742 | Buhot et al. | Aug 2010 | A1 |
| 20100211797 | Westerveld et al. | Aug 2010 | A1 |
| 20100240413 | He et al. | Sep 2010 | A1 |
| 20100257357 | McClain | Oct 2010 | A1 |
| 20100312634 | Cervenka | Dec 2010 | A1 |
| 20100312635 | Cervenka | Dec 2010 | A1 |
| 20110028160 | Roeding et al. | Feb 2011 | A1 |
| 20110035604 | Habraken | Feb 2011 | A1 |
| 20110060631 | Grossman et al. | Mar 2011 | A1 |
| 20110068170 | Lehman | Mar 2011 | A1 |
| 20110084132 | Tofighbakhsh | Apr 2011 | A1 |
| 20110101093 | Ehrensvard | May 2011 | A1 |
| 20110113245 | Varadrajan | May 2011 | A1 |
| 20110125638 | Davis et al. | May 2011 | A1 |
| 20110131415 | Schneider | Jun 2011 | A1 |
| 20110153437 | Archer et al. | Jun 2011 | A1 |
| 20110153496 | Royyuru | Jun 2011 | A1 |
| 20110208658 | Makhotin | Aug 2011 | A1 |
| 20110208965 | Machani | Aug 2011 | A1 |
| 20110211219 | Bradley | Sep 2011 | A1 |
| 20110218911 | Spodak | Sep 2011 | A1 |
| 20110238564 | Lim et al. | Sep 2011 | A1 |
| 20110246780 | Yeap et al. | Oct 2011 | A1 |
| 20110258452 | Coulier et al. | Oct 2011 | A1 |
| 20110280406 | Ma et al. | Nov 2011 | A1 |
| 20110282785 | Chin | Nov 2011 | A1 |
| 20110294418 | Chen | Dec 2011 | A1 |
| 20110312271 | Ma et al. | Dec 2011 | A1 |
| 20120024947 | Naelon | Feb 2012 | A1 |
| 20120030047 | Fuentes et al. | Feb 2012 | A1 |
| 20120030121 | Grellier | Feb 2012 | A1 |
| 20120047071 | Mullen et al. | Feb 2012 | A1 |
| 20120079281 | Lowenstein et al. | Mar 2012 | A1 |
| 20120109735 | Krawczewicz et al. | May 2012 | A1 |
| 20120109764 | Martin et al. | May 2012 | A1 |
| 20120143754 | Patel | Jun 2012 | A1 |
| 20120150737 | Rottink | Jun 2012 | A1 |
| 20120178366 | Levy et al. | Jul 2012 | A1 |
| 20120196583 | Kindo | Aug 2012 | A1 |
| 20120207305 | Gallo et al. | Aug 2012 | A1 |
| 20120209773 | Ranganathan | Aug 2012 | A1 |
| 20120238206 | Singh et al. | Sep 2012 | A1 |
| 20120239560 | Pourfallah et al. | Sep 2012 | A1 |
| 20120252350 | Steinmetz et al. | Oct 2012 | A1 |
| 20120254394 | Barras | Oct 2012 | A1 |
| 20120284194 | Liu et al. | Nov 2012 | A1 |
| 20120290472 | Mullen et al. | Nov 2012 | A1 |
| 20120296818 | Nuzzi et al. | Nov 2012 | A1 |
| 20120316992 | Oborne | Dec 2012 | A1 |
| 20120317035 | Royyuru et al. | Dec 2012 | A1 |
| 20120317628 | Yeager | Dec 2012 | A1 |
| 20130005245 | Royston | Jan 2013 | A1 |
| 20130008956 | Ashfield | Jan 2013 | A1 |
| 20130026229 | Jarman et al. | Jan 2013 | A1 |
| 20130048713 | Pan | Feb 2013 | A1 |
| 20130054474 | Yeager | Feb 2013 | A1 |
| 20130065564 | Conner et al. | Mar 2013 | A1 |
| 20130080228 | Fisher | Mar 2013 | A1 |
| 20130080229 | Fisher | Mar 2013 | A1 |
| 20130099587 | Lou | Apr 2013 | A1 |
| 20130104251 | Moore et al. | Apr 2013 | A1 |
| 20130106576 | Hinman et al. | May 2013 | A1 |
| 20130119130 | Braams | May 2013 | A1 |
| 20130130614 | Busch-Sorensen | May 2013 | A1 |
| 20130144793 | Royston | Jun 2013 | A1 |
| 20130171929 | Adams et al. | Jul 2013 | A1 |
| 20130179351 | Wallner | Jul 2013 | A1 |
| 20130185772 | Jaudon et al. | Jul 2013 | A1 |
| 20130191279 | Calman et al. | Jul 2013 | A1 |
| 20130200999 | Spodak et al. | Aug 2013 | A1 |
| 20130216108 | Hwang et al. | Aug 2013 | A1 |
| 20130226791 | Springer et al. | Aug 2013 | A1 |
| 20130226796 | Jiang et al. | Aug 2013 | A1 |
| 20130232082 | Krawczewicz et al. | Sep 2013 | A1 |
| 20130238894 | Ferg et al. | Sep 2013 | A1 |
| 20130282360 | Shimota et al. | Oct 2013 | A1 |
| 20130303085 | Boucher et al. | Nov 2013 | A1 |
| 20130304651 | Smith | Nov 2013 | A1 |
| 20130312082 | Izu et al. | Nov 2013 | A1 |
| 20130314593 | Reznik et al. | Nov 2013 | A1 |
| 20130344857 | Berionne et al. | Dec 2013 | A1 |
| 20140002238 | Taveau et al. | Jan 2014 | A1 |
| 20140019352 | Shrivastava | Jan 2014 | A1 |
| 20140027506 | Heo et al. | Jan 2014 | A1 |
| 20140032409 | Rosano | Jan 2014 | A1 |
| 20140032410 | Georgiev et al. | Jan 2014 | A1 |
| 20140040120 | Cho et al. | Feb 2014 | A1 |
| 20140040139 | Brudnicki et al. | Feb 2014 | A1 |
| 20140040147 | Varadarakan et al. | Feb 2014 | A1 |
| 20140047235 | Lessiak et al. | Feb 2014 | A1 |
| 20140067690 | Pitroda et al. | Mar 2014 | A1 |
| 20140074637 | Hammad | Mar 2014 | A1 |
| 20140074655 | Lim et al. | Mar 2014 | A1 |
| 20140081720 | Wu | Mar 2014 | A1 |
| 20140138435 | Khalid | May 2014 | A1 |
| 20140171034 | Aleksin et al. | Jun 2014 | A1 |
| 20140171039 | Bjontegard | Jun 2014 | A1 |
| 20140172700 | Teuwen et al. | Jun 2014 | A1 |
| 20140180851 | Fisher | Jun 2014 | A1 |
| 20140208112 | McDonald et al. | Jul 2014 | A1 |
| 20140214674 | Narula | Jul 2014 | A1 |
| 20140229375 | Zaytzsev et al. | Aug 2014 | A1 |
| 20140245391 | Adenuga | Aug 2014 | A1 |
| 20140256251 | Caceres et al. | Sep 2014 | A1 |
| 20140258099 | Rosano | Sep 2014 | A1 |
| 20140258113 | Gauthier et al. | Sep 2014 | A1 |
| 20140258125 | Gerber et al. | Sep 2014 | A1 |
| 20140274179 | Zhu et al. | Sep 2014 | A1 |
| 20140279479 | Maniar et al. | Sep 2014 | A1 |
| 20140337235 | Van Heerden et al. | Nov 2014 | A1 |
| 20140339315 | Ko | Nov 2014 | A1 |
| 20140346860 | Aubry et al. | Nov 2014 | A1 |
| 20140365780 | Movassaghi | Dec 2014 | A1 |
| 20140379361 | Mahadkar et al. | Dec 2014 | A1 |
| 20150012444 | Brown et al. | Jan 2015 | A1 |
| 20150032635 | Guise | Jan 2015 | A1 |
| 20150038087 | Park | Feb 2015 | A1 |
| 20150071486 | Rhoads et al. | Mar 2015 | A1 |
| 20150088757 | Zhou et al. | Mar 2015 | A1 |
| 20150089586 | Ballesteros | Mar 2015 | A1 |
| 20150134452 | Williams | May 2015 | A1 |
| 20150140960 | Powell et al. | May 2015 | A1 |
| 20150154595 | Collinge et al. | Jun 2015 | A1 |
| 20150170138 | Rao | Jun 2015 | A1 |
| 20150178724 | Ngo et al. | Jun 2015 | A1 |
| 20150186871 | Laracey | Jul 2015 | A1 |
| 20150205379 | Mag et al. | Jul 2015 | A1 |
| 20150302409 | Malek | Oct 2015 | A1 |
| 20150317626 | Ran et al. | Nov 2015 | A1 |
| 20150332266 | Friedlander et al. | Nov 2015 | A1 |
| 20150339474 | Paz et al. | Nov 2015 | A1 |
| 20150371234 | Huang et al. | Dec 2015 | A1 |
| 20160012465 | Sharp | Jan 2016 | A1 |
| 20160026997 | Tsui et al. | Jan 2016 | A1 |
| 20160048913 | Rausaria et al. | Feb 2016 | A1 |
| 20160055480 | Shah | Feb 2016 | A1 |
| 20160057619 | Lopez | Feb 2016 | A1 |
| 20160065370 | Le Saint et al. | Mar 2016 | A1 |
| 20160087957 | Shah et al. | Mar 2016 | A1 |
| 20160092696 | Guglani et al. | Mar 2016 | A1 |
| 20160148193 | Kelley et al. | May 2016 | A1 |
| 20160232523 | Venot et al. | Aug 2016 | A1 |
| 20160239672 | Khan et al. | Aug 2016 | A1 |
| 20160253651 | Park et al. | Sep 2016 | A1 |
| 20160255072 | Liu | Sep 2016 | A1 |
| 20160267486 | Mitra et al. | Sep 2016 | A1 |
| 20160277383 | Guyomarc'h et al. | Sep 2016 | A1 |
| 20160277388 | Lowe et al. | Sep 2016 | A1 |
| 20160307187 | Guo et al. | Oct 2016 | A1 |
| 20160307189 | Zarakas et al. | Oct 2016 | A1 |
| 20160314472 | Ashfield | Oct 2016 | A1 |
| 20160330027 | Ebrahimi | Nov 2016 | A1 |
| 20160335531 | Mullen et al. | Nov 2016 | A1 |
| 20160379217 | Hammad | Dec 2016 | A1 |
| 20170004502 | Quentin et al. | Jan 2017 | A1 |
| 20170011395 | Pillai et al. | Jan 2017 | A1 |
| 20170011406 | Tunnell et al. | Jan 2017 | A1 |
| 20170017957 | Radu | Jan 2017 | A1 |
| 20170017964 | Janefalkar et al. | Jan 2017 | A1 |
| 20170024716 | Jiam et al. | Jan 2017 | A1 |
| 20170039566 | Schipperheijn | Feb 2017 | A1 |
| 20170041759 | Gantert et al. | Feb 2017 | A1 |
| 20170068950 | Kwon | Mar 2017 | A1 |
| 20170103388 | Pillai et al. | Apr 2017 | A1 |
| 20170104739 | Lansler et al. | Apr 2017 | A1 |
| 20170109509 | Baghdasaryan | Apr 2017 | A1 |
| 20170109730 | Locke et al. | Apr 2017 | A1 |
| 20170116447 | Cimino et al. | Apr 2017 | A1 |
| 20170124568 | Moghadam | May 2017 | A1 |
| 20170140379 | Deck | May 2017 | A1 |
| 20170154328 | Zarakas et al. | Jun 2017 | A1 |
| 20170154333 | Gleeson et al. | Jun 2017 | A1 |
| 20170180134 | King | Jun 2017 | A1 |
| 20170230189 | Toll et al. | Aug 2017 | A1 |
| 20170237301 | Elad et al. | Aug 2017 | A1 |
| 20170289127 | Hendrick | Oct 2017 | A1 |
| 20170295013 | Claes | Oct 2017 | A1 |
| 20170316696 | Bartel | Nov 2017 | A1 |
| 20170317834 | Smith et al. | Nov 2017 | A1 |
| 20170330173 | Woo et al. | Nov 2017 | A1 |
| 20170374070 | Shah et al. | Dec 2017 | A1 |
| 20180034507 | Wobak et al. | Feb 2018 | A1 |
| 20180039986 | Essebag et al. | Feb 2018 | A1 |
| 20180068316 | Essebag et al. | Mar 2018 | A1 |
| 20180129945 | Saxena et al. | May 2018 | A1 |
| 20180160255 | Park | Jun 2018 | A1 |
| 20180191501 | Lindemann | Jul 2018 | A1 |
| 20180205712 | Versteeg et al. | Jul 2018 | A1 |
| 20180240106 | Garrett et al. | Aug 2018 | A1 |
| 20180254909 | Hancock | Sep 2018 | A1 |
| 20180268132 | Buer et al. | Sep 2018 | A1 |
| 20180270214 | Caterino et al. | Sep 2018 | A1 |
| 20180294959 | Traynor et al. | Oct 2018 | A1 |
| 20180300716 | Carlson | Oct 2018 | A1 |
| 20180302396 | Camenisch et al. | Oct 2018 | A1 |
| 20180315050 | Hammad | Nov 2018 | A1 |
| 20180316666 | Koved et al. | Nov 2018 | A1 |
| 20180322486 | Deliwala et al. | Nov 2018 | A1 |
| 20180359100 | Gaddam et al. | Dec 2018 | A1 |
| 20190014107 | George | Jan 2019 | A1 |
| 20190019375 | Foley | Jan 2019 | A1 |
| 20190036678 | Ahmed | Jan 2019 | A1 |
| 20190238517 | D'Agostino et al. | Aug 2019 | A1 |
| 20220237608 | Rule et al. | Jul 2022 | A1 |
| 20220247741 | Moreton et al. | Aug 2022 | A1 |
| Number | Date | Country |
|---|---|---|
| 3010336 | Jul 2017 | CA |
| 101192295 | Jun 2008 | CN |
| 103023643 | Apr 2013 | CN |
| 103417202 | Dec 2013 | CN |
| 1 085 424 | Mar 2001 | EP |
| 1 223 565 | Jul 2002 | EP |
| 1 265 186 | Dec 2002 | EP |
| 1 783 919 | May 2007 | EP |
| 2 852 070 | Jan 2009 | EP |
| 2 139 196 | Dec 2009 | EP |
| 1 469 419 | Feb 2012 | EP |
| 2 457 221 | Aug 2009 | GB |
| 2 516 861 | Feb 2015 | GB |
| 2 551 907 | Jan 2018 | GB |
| 101508320 | Apr 2015 | KR |
| WO 0049586 | Aug 2000 | WO |
| WO 2006070189 | Jul 2006 | WO |
| WO 2008055170 | May 2008 | WO |
| WO 2009025605 | Feb 2009 | WO |
| WO 2010049252 | May 2010 | WO |
| WO 2011112158 | Sep 2011 | WO |
| WO 2012001624 | Jan 2012 | WO |
| WO 2013039395 | Mar 2013 | WO |
| WO 2013155562 | Oct 2013 | WO |
| WO 2013192358 | Dec 2013 | WO |
| WO 2014043278 | Mar 2014 | WO |
| WO 2014170741 | Oct 2014 | WO |
| WO 2015179649 | Nov 2015 | WO |
| WO 2015183818 | Dec 2015 | WO |
| WO 2016097718 | Jun 2016 | WO |
| WO 2016160816 | Oct 2016 | WO |
| WO 2016168394 | Oct 2016 | WO |
| WO 2017042375 | Mar 2017 | WO |
| WO 2017042400 | Mar 2017 | WO |
| WO 2017157859 | Sep 2017 | WO |
| WO 2017208063 | Dec 2017 | WO |
| WO 2018063809 | Apr 2018 | WO |
| WO 2018137888 | Aug 2018 | WO |
| Entry |
|---|
| A Study Oon Multifactor Authentication Model Using Fingerprint Hash Code, Password and OTP, by Aithal et al., published 2018. (Year: 2018). |
| Batina, Lejla and Poll, Erik, “SmartCards and RFID,” PowerPoint Presentation for IPA Security Course, Digital Security at University of Nijmegen, Netherlands (date unknown), 75 pages. |
| Haykin M. and Warnar, R., “Smart Card Technology: New Methods for Computer Access Control,” Computer Science and Technology NIST Special Publication 500-157:1-60 (1988). |
| Lehpamer, Harvey, “Component of the RFID System,” RFID Design Principles, 2nd edition pp. 133-201 (2012). |
| Pourghomi, Pardis et al., “A Proposed NFC Payment Application,” International Journal of Advanced Computer Science and Applications, vol. 4, No. 8 (2013). |
| Author Unknown, “CardrefresherSM from American Express®,” [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://merchant-channel.americanexpress.com/merchant/en_US/cardrefresher, 2 pages. |
| Author Unknown, “Add Account Updater to your recurring payment tool,” [online] 2018-19 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.authorize.net/our-features/account-updater/, 5 pages. |
| Author Unknown, “Visa® Account Updater for Merchants,” [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://usa.visa.com/dam/VCOM/download/merchants/visa-account-updater-product-information-fact-sheet-for-merchants.pdf, 2 pages. |
| Author Unknown, “Manage the cards that you use with Apple Pay,” Apple Support [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://support.apple.com/en-us/HT205583, 5 pages. |
| Author Unknown, “Contactless Specifications for Payment Systems,” EMV Book B—Entry Point Specification [online] 2016 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.emvco.com/wp-content/uploads/2017/05/BookB_Entry_Point_Specification_v2_6_20160809023257319.pdf, 52 pages. |
| Author Unknown, “EMV Integrated Circuit Card Specifications for Payment Systems, Book 2, Security and Key Management,” Version 3.4, [online] 2011 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.emvco.com/wp-content/uploads/2017/05/EMV_v4.3_Book_2_Security_and_Key_Management_20120607061923900.pdf, 174 pages. |
| Author unknown, “NFC Guide: All You Need to Know About Near Field Communication” Square Guide [online] 2018 [retrieved on Nov. 13, 2018]. Retrieved from Internet URL: https://squareup.com/guides/nfc, 8 pages. |
| Profis, S., “Everything you need to know about NFC and mobile payments” CNET Directory [online], 2014 [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://www.cnet.com/how-to/how-nfc-works-and-mobile-payments/, 6 pages. |
| Cozma, N., “Copy data from other devices in Android 5.0 Lollipop setup” CNET Directory [online] 2014 [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://www.cnet.com/how-to/copy-data-from-other-devices-in-android-5-0-lollipop-setup/, 5 pages. |
| Kevin, Android Enthusiast, “How to copy text string from nfc tag” StackExchange [online] 2013 [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://android.stackexchange.com/questions/55689/how-to-copy-text-string-from-nfc-tag, 11 pages. |
| Author unknown, “Tap & Go Device Setup” Samsung [online] date unknown [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://www.samsung.com/us/switch-me/switch-to-the-galaxy-s-5/app/partial/setup-device/tap-go.html, 1 page. |
| Author Unknown, “Multiple encryption”, Wikipedia [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://en.wikipedia.org/wiki/Multiple_encryption, 4 pages. |
| Krawczyk, et al., “HMAC: Keyed-Hashing for Message Authentication”, Network Working Group RFC:2104 memo [online] 1997 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://tools.ietf.org/html/rfc2104, 12 pages. |
| Song, et al., “The AES-CMAC Algorithm”, Network Working Group RFC: 4493 memo [online] 2006 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://tools.ietf.org/html/rfc4493, 21 pages. |
| Katz, J., and Lindell, Y., “Aggregate Message Authentication Codes”, Topics in Cryptology [online] 2008 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.cs.umd.edu/˜jkatz/papers/aggregateMAC.pdf, 11 pages. |
| Adams, D., and Maier, A-K, “Goldbug Big Seven open source crypto-messengers to be compared- : or Comprehensive Confidentiality Review & Audit of GoldBug Encrypting E-Mail-Client & Secure Instant Messenger”, Big Seven Study 2016 [online] [retrieved on Mar. 25, 2018]. Retrieved from Internet URL: https://sf.net/projects/goldbug/files/bigseven-crypto-audit.pdf, 309 pages. |
| Author Unknown, “Triple DES”, Wikipedia [online] 2018 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://simple.wikipedia.org/wiki/Triple_DES, 2 pages. |
| Song, F., and Yun, A.l, “Quantum Security of NMAC and Related Constructions—PRF domain extension against quantum attacks”, IACR Cryptology ePrint Archive [online] 2017 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://eprint.iacr.org/2017/509.pdf, 41 pages. |
| Saxena, N., “Lecture 10: NMAC, HMAC and Number Theory”, CS 6903 Modern Cryptography [online] 2008 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: http://isis.poly.edu/courses/cs6903/Lectures/lecture10.pdf, 8 pages. |
| Berg, Guy, “Fundamentals of EMV” Smart Card Alliance [online] date unknown [retrieved on Mar. 27, 2019]. Retrieved from Internet URL: https://www.securetechalliance.org/resources/media/scap13_preconference/02.pdf, 37 pages. |
| Pierce, Kevin, “Is the amazon echo NFC compatible,?” Amazon.com Customer Q&A [online] 2016 [retrieved on Mar. 26, 2019]. Retrieved from Internet URL: https://www.amazon.com/ask/questions/Tx1RJXYSPE6XLJD?_encodi . . . , 2 pages. |
| Author Unknown, “Multi-Factor Authentication”, idaptive [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.centrify.com/products/application-services/adaptive-multi-factor-authentication/risk-based-mfa/, 10 pages. |
| Author Unknown, “Adaptive Authentication”, SecureAuth [online] 2019 [retrieved on Mar. 25, 2019}. Retrieved from Internet URL: https://www.secureauth.com/products/access-management/adaptive-authentication, 7 pages. |
| Van den Breekel, J., et al., “EMV in a nutshell”, Technical Report, 2016 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.cs.ru.nl/E.Poll/papers/EMVtechreport.pdf, 37 pages. |
| Author Unknown, “Autofill”, Computer Hope [online] 2018 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.computerhope.com/jargon/a/autofill.htm, 2 pages. |
| Author Unknown, “Fill out forms automatically”, Google Chrome Help [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://support.google.com/chrome/answer/142893?co=GENIE.Platform%3DDesktop&hl=en, 3 pages. |
| Author unknown, “Autofill credit cards, contacts, and passwords in Safari on Mac”, Apple Safari User Guide [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://support.apple.com/guide/safari/use-autofill-ibrw1103/mac, 3 pages. |
| Menghin, M.J., “Power Optimization Techniques for Near Field Communication Systems” 2014 Dissertation at Technical University of Graz [online]. Retrieved from Internet URL: https://diglib.tugraz.at/download.php?id=576a7b910d2d6&location=browse, 135 pages. |
| Mareli, M., et al., “Experimental evaluation of NFC reliability between an RFID tag and a smartphone” Conference paper (2013) IEEE Africon at Mauritius [online] [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://core.ac.uk/download/pdf/54204839.pdf, 5 pages. |
| Davison, A., et al., “MonoSLAM: Real-Time Single Camera SLAM”, IEEE Transactions on Pattern Analysis and Machine Intelligence 29(6): 1052-1067 (2007). |
| Barba, R., “Sharing your location with your bank sounds creepy, but it's also useful”, Bankrate, LLC [online] 2017 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.bankrate.com/banking/banking-app-location-sharing/, 6 pages. |
| Author unknown: “onetappayment™”, [online] Jan. 24, 2019, [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.payubiz.in/onetap, 4 pages. |
| Vu et al., (2012). “Distinguishing users with capacitive touch communication” Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM. 10.1145/2348543.2348569. |
| EMVCo, EMV Card Personalization Specification, version 1.0 (Jun. 2003), 81 pages. |
| Ullmann et al., (2012). “On-Card User Authentication for Contactless Smart Cards based on Gesture Recognition”, LNI, 223-234, 12 pages. |
| Faraj et al. (2008). “Investigation of Java Smart Card Technology for Multi-Task Applications” J. of Al-Anbar University for Pure Science, vol. 2: No. 1: 2008, 11 pages. |
| Dhamdhere (2017) “Key Benefits of a Unified Platform for Loyalty, Referral Marketing, and UGC” Annex Cloud [retrieved on Jul. 3, 2019]. Retrieved from Internet URL: https://www.annexcloude.com/blog/benefits-unified-platform/, 13 pages. |
| The International Search Report and Written Opinion dated Jul. 3, 2024, for related Int. App. No. PCT/US24/18823 (11 pages). |
| Laor et al., “DrawnApart: A Device Identification Technique based on Remote GPU Fingerprinting”, arVix Jan. 24, 2022; https://arxiv.org/abs/2201.09956. |
| Number | Date | Country | |
|---|---|---|---|
| 20240305626 A1 | Sep 2024 | US |