Systems and methods for multi-factor authentication using device tracking and identity verification

Information

  • Patent Grant
  • 12147983
  • Patent Number
    12,147,983
  • Date Filed
    Friday, January 13, 2023
    2 years ago
  • Date Issued
    Tuesday, November 19, 2024
    3 months ago
Abstract
Systems and methods are directed to a modified device configuration for disposing a NFC compatible user card within a NFC field of a user mobile device so as to enable continuous proximity monitoring based on a status of an NFC link established between the card and the mobile device. The modified device configuration may be utilized to implement card tracking functionality by using a mobile application, running on the mobile device, to generate a timestamp upon detection of change in a connectivity status of the NFC link to the card. The timestamp NFC connectivity data may then be paired with mobile device GPS coordinates, concurrently retrieved from one or more mobile GPS-based navigation applications, to facilitate card tracking functionality as well as multi-factor validation for electronic transactions initiated by the NFC compatible card and/or the mobile device.
Description
FIELD OF THE DISCLOSURE

The present disclosure is generally related to device proximity detection based on near field communication, and more specifically to the implementation of device tracking and identity verification functionalities based on device proximity detection for multi-factor authentication.


BACKGROUND

Electronic transactions, initiated by a smart card and/or a mobile device application, generally involve a single factor of authentication based on verification of data stored on the card and/or transmitted in the transaction request message. With the ubiquity of smart phones, some authentication approaches have incorporated a secondary user device verification routine into the authentication process, by requiring a user to verify a card-initiated transaction via a corresponding user mobile device, as an additional security measure towards fraud prevention.


However, these approaches involve user-provided identification data inputted via a secondary device and are hampered by limited scope of authentication security. In addition, implementation that is contingent upon user-provided input authentication information may be sup-optimal for purposes of security and the user experience.


These are other deficiencies exist. Accordingly, there is a need for systems and methods implementing secure, user-friendly multi-factor authentication.


SUMMARY OF THE DISCLOSURE

One aspect of the present disclosure is directed to an implementation of multi-factor transaction authentication based proximity monitoring of a user card by a mobile application. The process may be facilitated by an external card storage component which disposes the card within a Near Field Communication (NFC) field of a mobile device running a link monitoring and location tracking application. As such, one aspect of the proposed solution may be directed to a method comprising the step of: providing a mobile device associated with a user, with an external card pocket, structured to store a user card within a Near-Field communication (NFC) field of the mobile device, monitoring, by a user application stored on the mobile device, a connectivity status of an NFC link established between the user card, disposed in the card pocket, and the mobile device, generating one or more event timestamps associated with one or more detection events, wherein each detection event corresponds to a change in the connectivity status of the NFC link, comparing, by a validation process, a most recent event timestamp from the one or more event timestamps, with a transaction timestamp associated with a transaction request message for a transaction initiated by the user card, wherein the one or more event timestamps are transmitted to the validation process by the user application, verifying that the transaction timestamp does not exceed the most recent event timestamp by more than a predefined threshold value, wherein the most recent event timestamp corresponds to a removal of the card from the card pocket.


In accordance to some embodiments of the present disclosure, the method may further comprise recording a Global Positioning System (GPS) location coordinates corresponding to a GPS location of the mobile device, at each of the one or more event timestamp. The validation process may then generate a multi-factor strong transaction validation response based on the verification of a merchant location from a GPS location of the mobile device associated with the most recent event timestamp, and the comparison of the most recent event timestamp with the transaction timestamp.


One aspect of the present disclosure is directed to a system for implementing multi-factor transaction authentication based on device proximity monitoring and location tracking, the system comprising a structural element for storing a user card within a Near-Field communication (NFC) range of a mobile device running a user application, the system further comprising a computer hardware arrangement configure to: monitor, by the user application stored on the mobile device, a connectivity status of an NFC link established between the user card, when stored in the structural element, and the mobile device, generate one or more event timestamps associated with one or more detection events, wherein each detection event corresponds to a change in the connectivity status of the NFC link, compare, by a validation process, a most recent event timestamp from the one or more event timestamps, with a transaction timestamp associated with a transaction request message for a transaction initiated by the user card, wherein the one or more event timestamps are transmitted to the validation process by the user application. The system may then verify that the transaction timestamp does not exceed the most recent event timestamp by more than a predefined threshold value, wherein the most recent event timestamp corresponds to a removal of the card from the card pocket. Upon verifying that a time interval associated with the removal of the card from the card pocket does not exceed a predetermined threshold value, the system may generate a two-factor strong validation response for the transaction request message based on verifying proximity of the user card to the mobile device.


In accordance to some embodiments of the present disclosure, the system may further be configured to record a Global Positioning System (GPS) location coordinates corresponding to a GPS location of the mobile device, at each of the one or more event timestamp. The system may then generate a multi-factor strong transaction validation response based on the verification of a merchant location from a GPS location of the mobile device associated with the most recent event timestamp, and the comparison of the most recent event timestamp with the transaction timestamp.


One aspect of the present disclosure is directed to a non-transitory computer-accessible medium having stored thereon computer-executable instructions for implementing multi-factor transaction authentication based on card proximity and location tracking data.





BRIEF SUMMARY OF THE DRAWINGS


FIG. 1A illustrates an exemplary interaction between a contactless card and a mobile device based on continuous short-range link monitoring, in accordance to some embodiments of the present disclosure.



FIG. 1B illustrates an exemplary structure with a card pocket arrangement for enabling interaction based on continuous short-range link monitoring, in accordance to some embodiments of the present disclosure.



FIG. 2A illustrates an exemplary modified device and device configuration for continuous card tracking implementation based on NFC link monitoring, in accordance to some embodiments of the present disclosure.



FIG. 2B illustrates an overview of an exemplary timestamping operation for generation of card tracking data, in accordance to some embodiments of the present disclosure.



FIG. 3 illustrates an embodiment of the modified device configuration for implementing multi-factor transaction authentication functionality, in accordance to some embodiments of the present disclosure.



FIG. 4 illustrates a flow chart for a process of using proximity event timestamping based on NFC link status monitoring to provide a two-factor strong transaction authentication capability, in accordance to some embodiments of the present disclosure.



FIG. 5 illustrates a flow chart for a process of using GPS location data in conjunction with NFC link status monitoring to provide a three-factor strong transaction authentication capability, in accordance to some embodiments of the present disclosure.



FIG. 6 is an illustration of an exemplary block diagram of an exemplary system, in accordance to some embodiments of the present disclosure.





DETAILED DESCRIPTION

The following description of embodiments provides non-limiting representative examples referencing numerals to particularly describe features and teachings of different aspects of the invention. The embodiments described should be recognized as capable of implementation separately, or in combination, with other embodiments from the description of the embodiments. A person of ordinary skill in the art reviewing the description of embodiments should be able to learn and understand the different described aspects of the invention. The description of embodiments should facilitate understanding of the invention to such an extent that other implementations, not specifically covered but within the knowledge of a person of skill in the art having read the description of embodiments, would be understood to be consistent with an application of the invention.


In one aspect, the disclosed systems and methods aim to enhance the fraud prevention utility of contactless one time password (OTP) card transactions by including an addition layer of authentication security to the corresponding back-end validation process. The enhancement is facilitated by maintaining a continuous Near Filed Communication (NFC) contact between a mobile device and the contactless card using an external cardholder attached to the mobile device. This enables the mobile device to report the location of the card to a back-end validation process based on the detected status of the NFC link. The proposed arrangement comprises a mobile device with a cardholder pocket for storing a contactless OTP card within a NFC range of the mobile device reader which enables back-end tracking of the card activity with respect to its proximity with a secondary user device (e.g., the mobile phone). This provides a second factor of authentication for transaction conducted with the contactless OTP card without requiring a secondary authentication input from the user.


The disclosed physical arrangement and operational configuration for operating a contactless OTP card withing an NFC range of a mobile communication device (e.g., by using a cardholder pocket overlapping a communication field emanating from a reader of the mobile communication device) also provides active reporting of the card location based on an ON/OFF status of the NFC link, (e.g., corresponding to the insertion and removal of the card from the cardholder) which further provides a card tracking utility in case of a lost and/or stolen card.



FIG. 1A illustrates an overview of the interaction between a mobile device (102) and a user card (104). The communication between the two devices (e.g., the mobile device (102) and the card (104)) is proximity-based and is enabled across a NFC link (106) which is established as the user card (104) enters an NFC field generated by, for example, the reader component (103) of the mobile device (102). An NFC tag on the user card may then communicate with the mobile device when in NFC proximity of the Mobile device reader. A corresponding user application (108) running on the mobile device may then receives and process the NFC transmitted data. The NFC field can be generated by a mobile device (e.g., a smartphone), a point-of-sale device, or other devices. The data (107) retrieved by the user application (108) may correspond to a connectivity status of the NFC link (106), which conveys either an active or an inactive status signifying that the card is present or not present within proximity of the mobile device (102).



FIG. 1B illustrates an exemplary back-view illustration (125) of a modified device (120) comprising a mobile device accessory, featuring a card storage compartment and/or pocket (e.g., card holder/storage component (122)) that stores an NFC-readable card (104) and may be utilized for operationally integrating the user mobile device (102) with the user card (104). For example, an active or inactive status of the NFC link (106) may signify that the card (104) is present or not present within the cardholder (122). A change in the connectivity status of the NFC link (106) from inactive to active may correspond to insertion of the user card (104) into the card pocket (122). Similarly a change in the NFC link status from active to inactive may correspond to removal of the user card (104) from the card pocket (122). The corresponding configuration may then be used to implement proximity monitoring/card tracking and multi-factor transaction authentication functionalities (e.g., for electronic transactions initiated by either the card or the mobile device.) In some embodiments, the card pocket may correspond to an external storage component affixed to the mobile device and structured to dispose the user card within a near-field communication (NFC) field of the mobile device. Accordingly, the (external) card storage component (also referred to as the card pocket) may be structurally configured to dispose the NFC tag of the user card (104) in an optimal orientation for establishing a proximity-based NFC link (106) with the NFC reader (103) of the mobile device (102). As shown in the exemplary back-view illustration (125) of the modified device (120) with the card holder/storage component (122), the user card (104), when stored in the card pocket (122), is oriented in such a way that the NFC tag of the card overlaps the NFC reader (103) of the mobile device (102). Accordingly, an active proximity-based NFC signal is established between the user card (104) (e.g., integrated NFC tag of the card) and the mobile device (102) (e.g., NFC reader component of the mobile device). The back-view (125) illustrate the overlay of the NFC tag with the mobile device NFC reader.


In some embodiments, the user card (104) stored in the card pocket (106), may correspond to a contactless card. The contactless card may comprise an integrated processor and memory that may store, for example, user identifying and/or authenticating information as near field communication (NFC) transmittable data (e.g., NFC Data Exchange Format (NDEF)). The integrated memory may store one or more applets that may be communicatively coupled to one or more applications (e.g. application 107) running on the user mobile and/or computing device (102) as well as one or more applications stored on a corresponding application server. The card-integrated memory may also store an application transaction counter (CTR) to keep track of a proper sequence of operations associated with a transaction conducted using the contactless card. The contactless card may further comprise a Near Field Communication (NFC) interface (e.g., NFC TAG) to facilitate NFC communication with an NFC reader (e.g., reader component (103) of the mobile device (102)). The user authentication information may then be directly captured by the reader component of the mobile user device by bringing the contactless card within an NFC range of the mobile device (e.g., by storing the contactless card in the card pocket (122) to overlay with the NFC reader (103) of the user mobile device) to, for example, initiate a direct read and subsequent validation of user authentication information stored, as NFC transmittable data, on the contactless card.


As described herein, one embodiment of the aforementioned configuration for operational integration of a user-card with one or more applications running on a mobile device, may be directed to a card tracking functionality as shown in FIG. 2A. As described with reference to FIG. 1, the mobile device (102) may maintain a continuous NFC link with the user card (104), as long the card remain within NFC field proximity of the mobile device. Accordingly, the exemplary card tracking configuration (200) comprising the modified device (120) with a card pocket (122), enables an active and/or continuous monitoring of the NFC link (106) by positioning the card in an orientation relative to the NFC reader (103) of the mobile device that optimize the NFC connectivity between the card and the mobile device. Upon removal of the card from the card pocket (122), the NFC link (106) is broken. A detection event corresponding to a change in a status of the NFC link (106) maybe used, by a mobile user application (208), to trigger a set of response such as generation of a timestamp, indicating a time for the change in the status of the NFC link, and retrieval of geolocation data, indicating the location coordinates of the mobile device (102) at the time of the change. The geolocation data may be retrieved from one or more GPS and/or navigation related application running on the mobile device. This is illustrated in example (200), by the location request (205) and location response (206) messages exchanged between the (card tracking) user application (208) and a GPS application (209) stored on the mobile device.


Card proximity detection based on active/passive NFC link status monitoring may correspond to detection of two discrete conditions corresponding to detection of a NFC link loss upon removal of the user card (104) from the card-pocket (122) and detection of an active NFC link established upon insertion/re-insertion of the card (104) into the card-pocket (122). The NFC link monitoring data, communicating a connectivity status of the NFC link, is transmitted by and/or retrieved from the NFC reader (103) of the mobile device (102) as indicated by the data transfer action (107). Upon receiving the NFC link status data, an exemplary timestamping operation (207), may be carried out by the user mobile application (208), for generating the card tracking data (210) as further illustrated in FIG. 2B.



FIG. 2B illustrated an exemplary overview of a timestamping operation (207) which may involve generating a timestamp for each detection event corresponding to a change in the connectivity status of the NFC link (106), detected by user application the (208), based on the active NFC link monitoring data (107) from the NFC reader. The operation may further involve a location data request message (205) and a retrieval of geolocation data (206) corresponding to the location of the mobile device, as provided by one or more mobile GPS-based application (209). As described herein, the aforementioned location data communication may be initiated upon the detection of a NFC link status event. The timestamped NFC link status data and corresponding GPS location data (206) may then be compiled into one or more data structures as shown by the exemplary card tracking datasets (210). The card tracking data (210) may then be stored by the mobile device and/or communicated to a remote validation server to facilitate card tracking and/or multi-factor authentication functionalities.


In some embodiments the card tracking data may be used to identify a lost card situation and a user notification may be provided via, for example the user mobile device. In such situation there may be a pre-defined window of time during which a loss of NFC link may be attributed to temporary removal of the card from the card pocket for the purpose of conducting a transaction. As such a lost card notification may be generated by a card tracking application (e.g., 208) based on a determination that a timelapse associated with the most recent event timestamp exceeds the predefined threshold value. A notification may then be generated and communicated to the user with a timestamp corresponding to the last recorded location of the card based on GPS reading on the mobile device, with the most recent GPS location of the mobile device corresponding to the most recently recorded timestamp. The aforementioned threshold (time-window) value may be specified by the user or determined by the system and/or the user (mobile) application based on historical geo-tracking and card proximity data. In some embodiments.



FIG. 3 illustrate an exemplary embodiment of the device (120), utilizing the card pocket structure (122), in implementing a (modified) transaction authentication process (306) for electronic transactions conducted with the card (104) and, for example, a Point Of Sale (POS) device (302) located at a merchant location. In some embodiment, transaction request (308) may correspond to an electronic card transaction conducted remotely via, for example, a merchant website. The aforementioned embodiments provide a fraud prevention functionality for electronic transaction involving the modified device (120) by confirming a presence of a distinct secondary user device in proximity of the transaction initiating user device.


In some embodiments the card tracking data (comprising timestamped NFC link status and GPS location data) generated based on the modified device (120), may be used to enable a multi-factor authentication of electronic transaction conducted by the user card (104) and/or the mobile device (102). In such situation there may be a pre-defined window of time during which a loss of NFC link may be attributed to temporary removal of the card from the card pocket for the purpose of conducting a transaction. As such a second-factor validation parameter may be based on a determination that a timelapse between the most recent event timestamp and reception, by the validation server (310), of an incoming card transaction request (308), does not exceeds the predefined threshold value, thereby establishing the proximity of the user card (104) to a second user device (e.g., mobile device (102)). The threshold (time-window) value may be specified by the user or determined by the system and/or the user (mobile) application based on historical geo-tracking and card proximity data.


Referring back to FIG. 3, a time period lapsed between a card-removal event (309) corresponding to the most recent event timestamp (e.g., t4-removal with respect to card tracking data (210)) and the reception of a transaction request message (308) by the validation server (310) may be calculated and compared with the aforementioned threshold time-window by the modified validation process (306) running on the receiving validation server (310). If the removal time window (309), based on the most recent event timestamp, for example as received via dataset (210), and detection of the transaction request message (308) by the validation server (310) does not exceed the threshold time-window value, a two-factor strong validation response may be generated for the electronic transaction request message (308). In some embodiments, upon determining that an incoming transaction timestamp exceeds the most recent event timestamp, by more than the predefined threshold value, a notification may be generated and communicated to the user. The notification may further comprise a timestamp corresponding to the last recorded location of the card based on GPS reading on the mobile device. Accordingly, the validation of the transaction request may be suspended pending reception of a user confirmation signal via the mobile device (102).


Another embodiments associated with system implementation (300) may corresponds to a multi-factor authentication for an electronic transaction request (e.g., transaction request (312)) initiated by the mobile device (102). With reference to the mobile device initiated transaction request message (312), the proximity information to a secondary user device (e.g., card (104)) may be communicated, via the card tracking data, along with other user and/or account identifying information to enhance a security of the authentication process against fraudulent electronic transactions that may, for example, be attempted with stolen user and/or account identifying information. The card proximity information (transmitted in the card tracking data) may be provided as an additional factor of authentication. As such upon receiving the online transaction request (312), a two-factor strong verification process may be performed by the modified validation process (306), the two-factor strong verification process being based on a determination that the transaction timestamp, associated with the online transaction, does not exceed the most recent event timestamp in the card tracking data (210), by more than the predefined threshold value. Upon determining that the transaction timestamp exceeds the most recently recorded event timestamp, by more than the predefined threshold value, a user alert notification may be generated by the user application running on the mobile device.


With reference to the exemplary embodiment (300), further enhancement of authentication security may be achieved by using the GPS location data for geo-identification of a merchant location associated with an incoming transaction request (e.g., card transaction request (308) and/or mobile device initiated transaction request (312)). The modified validation process (306) may then identify a merchant based on the GPS location data provided in the card tracking data (210) and compare merchant identifying data (determined based on the reported GPS location) with one or more merchant identifiers extracted from the transaction string data (e.g., corresponding to transaction request (308) and/or (312)). The geo-identification of the merchant based on the GPS location data recorded in the card tracking data and verification of the corresponding card proximity data relative to the predefined threshold value may be used by the modified verification process (306) to generate, a multi-factor strong validation message (314) corresponding to three factors of identity verification, in response to the incoming transaction request.



FIG. 4 illustrates an exemplary operational flow for implementing a two-factor authentication of electronic transactions based on modified device configuration (120). The operational flow diagram (400) may apply to electronic transactions initiated by either the user card (104) and/or the mobile device (102) associated with the modified device configuration (120). The basis of the implementation is to verify the proximity of another device (without requiring an additional action by the user) using out of band (OOB) transmission of card proximity data to a transaction validation server. The card proximity data may then be used in validation of a transaction request message initiated by either of the devices associated with the modified device configuration (120) (e.g., user card and/or user mobile device). Referring back to FIG. 4, at step (402), the exemplary process flow (400) may detect a change in the NFC link status established between the user card and the mobile device and generate an event timestamps in response to detected event corresponding to a link up or a link down condition. At step (404), upon detection of link down status an application running on the mobile device may transmit, the timestamp indicating a change in the NFC link status.


A validation process receiving an electronic transaction validation request, may validate the electronic transaction string based on data provided in the transaction message (step 406). Upon authenticating the transaction request string, the validation process may further analyze the out of band data (e.g., data received in association with and/or in conjunction to the electronic transaction that was not included in the initial transaction string) to confirm, based on card-proximity timestamps, that the period of time the card has been away from the card pocket does not exceed a predetermined Threshold value. Once the card-mobile device proximity at least for a period of time corresponding to the predefined threshold value has been determined at step (408), a two-factor strong transaction validation message may be generated and transmitted back in response to the transaction request, at step (410). Conversely, if it is determined, at step (408), that the card-removal timestamp exceeds the threshold value, indicating extended period of separation between the user card and the mobile device, the process may move onto step (412) wherein a notification may be transmitted to the mobile device and the validation process declined and/or suspended pending reception of a user confirmation response from the mobile device.



FIG. 5 illustrates an exemplary operational flowchart (500) for implementing a multi-factor authentication with the modified device (120), based on verification of timestamped NFC link status and GPS location data in correspondence to an electronic transaction initiated by either the user card (104) or the mobile device (102). The transaction may be initiated by the mobile device using for example a mobile application with authentication functionality, such as a banking application and/or an authentication application stored on the mobile device. The transaction may also be initiated by the user card by removing the card from the designated card pocket (attached to the mobile device and tap or swiping it at a POS) device. A card transaction may also correspond to entering the card information along with any card and/or user authentication data into an online payment interface of a merchant website for conducting an online transaction. In such cases, verification of proximity to a secondary user device may serve as a second identification factor for authenticating the electronic transaction as previously discussed with reference to FIGS. 3 and 4. As further discussed with reference to FIG. 3, a multi-factor authentication scheme may also be implemented based on the modified device configuration (120). FIG. 5 illustrates a operational flow diagram for an exemplary three-factor transaction authentication scheme (500) using three factor of identity authentication based on timestamped NFC link status data (to verify proximity with a secondary user device) and GPS location data as provided by the card tracking data (to verify a transacting merchant location against merchant identifying information extracted from an incoming transaction request string)


Referring back to FIG. 5, step (502) corresponds to detection of a NFC link status change and generation of a timestamp associated with the link status event. At step (504), data from a mobile GPS application may be retrieved to determine a physical location of the modified device at transaction time. The operation at step (504) may occur concurrent or consecutive to the generation of the timestamp indicating a link change status at step (502). The retrieved GPS location data and the (link loss) timestamp may be included in a card tracking dataset (step 504). At step (506), the data step generated in step (504) may be provided, by the mobile authentication application for example, to a validation process in conjunction with a transaction request initiated by either the user card (104) or the mobile device(102).


The validation process receiving the transaction request and the card tracking dataset, may first validate the electronic transaction string based on authentication and/or account data provided in the transaction message (step 508). This step may also correspond to the action associated with step (406) in FIG. 4. Upon authenticating the transaction request string, the validation process may move to step (510) for verifying proximity data relative to a second user device, based on information provided in the card tracking dataset. If the proximity data relative to the second user device is not available for a period exceeding the predefined threshold value, indicating an extended period of separation between the card and the phone, one or more action may be initiated by the validation process as indicated by step (512). The one or more actions may comprise, for example, generating a notification to the mobile device to alert a user and/or suspending the validation of the transaction request pending, for example, a receipt of a user confirmation signal from the mobile device. However, if the proximity data relative to the second user device is verified at step (510), the process may move onto step (514).


At step (514), the card tracking dataset may be further examined to confirm that the corresponding timestamped GPS location data matches a location of the merchant identified from the transaction request string. If a match is not identified, the one or more actions associated with step (512) may be performed. However, if the GPS location data matches merchant information extracted from the transaction string at step (514), a multi-factor strong validation response (e.g., corresponding to a verification of a secondary device proximity and the transaction-initiation location) may be generated in response to the transaction request message.


In some embodiments, one or more of the forementioned computations and operation, for card tracking and providing multiple factors of authentication based on dynamic NFC link status and mobile GPS location data, may be executed, in part or in whole, by one or more applications running on the user mobile device and/or one or more server-side applications running on a corresponding remote validation server communicatively coupled to the one or more user application running on the user mobile device across a network.



FIG. 6 shows a block diagram of an exemplary embodiment of a system according to the present disclosure. For example, exemplary procedures in accordance with the present disclosure described herein can be performed by a processing arrangement and/or a computing arrangement (e.g., computer hardware arrangement) (605). Such processing and/or computing arrangement (605) can be, for example entirely or a part of, or include, but not limited to, a computer and/or processor (610) that can include, for example one or more microprocessors, and use instructions stored on a computer-accessible medium (e.g., RAM, ROM, hard drive, or other storage device).


As shown in FIG. 6, for example a computer-accessible medium (615) (e.g., as described herein above, a storage device such as a hard disk, floppy disk, memory stick, CD-ROM, RAM, ROM, etc., or a collection thereof) can be provided (e.g., in communication with the processing arrangement (605)). The computer-accessible medium (615) can contain executable instructions (620) thereon. In addition or alternatively, a storage arrangement (625) can be provided separately from the computer-accessible medium (615), which can provide the instructions to the processing arrangement (605) so as to configure the processing arrangement to execute the exemplary procedures, processes, and methods, as described herein above, for example.


Further, the exemplary processing arrangement (605) can be provided with or include an input and/or output ports (635), which can include, for example a wired network, a wireless network, the internet, an intranet, a data collection probe, a sensor, etc. As shown in FIG. 6, the exemplary processing arrangement (605) can be in communication with an exemplary display arrangement (630), which, according to certain exemplary embodiments of the present disclosure, can be a touch-screen configured for inputting information to the processing arrangement in addition to outputting information from the processing arrangement, for example. Further, the exemplary display arrangement (630) and/or a storage arrangement (625) can be used to display and/or store data in a user-accessible format and/or user-readable format.


In some aspects, the techniques described herein relate to a method for incorporating device proximity monitoring in multi-factor authentication, the method including: providing a mobile device associated with a user, with an external card pocket, structured to store a user card within a Near-Field communication (NFC) field of the mobile device; monitoring, by a user application stored on the mobile device, a connectivity status of an NFC link established between the user card, disposed in the card pocket, and the mobile device; generating one or more event timestamps associated with one or more detection events, wherein each detection event corresponds to a change in the connectivity status of the NFC link; comparing, by a validation process, a most recent event timestamp from the one or more event timestamps, with a transaction timestamp associated with a transaction request message for a transaction initiated by the user card, wherein the one or more event timestamps are transmitted to the validation process by the user application; verifying that the transaction timestamp does not exceed the most recent event timestamp by more than a predefined threshold value, wherein the most recent event timestamp corresponds to a removal of the card from the card pocket; and generating a two-factor strong validation response for the transaction request message based on verifying proximity of the user card to the mobile device.


In some aspects, the techniques described herein relate to a method, further including recording a Global Positioning System (GPS) location coordinates corresponding to a GPS location of the mobile device, at each of the one or more event timestamps.


In some aspects, the techniques described herein relate to a method, wherein a most recent GPS location of the mobile device corresponds to the most recently recorded timestamp.


In some aspects, the techniques described herein relate to a method, further including, verifying, by the validation process, that the most recent GPS location of the mobile device corresponds to a merchant location identified from the transaction request message.


In some aspects, the techniques described herein relate to a method, further including, generating, by the validation process, a multi-factor strong validation response corresponding to a verification of a merchant location based on verification of the most recent GPS location of the mobile device and the most recent event timestamp.


In some aspects, the techniques described herein relate to a method, wherein the user application includes one or more application components running on a remote validation server associated with the validation process.


In some aspects, the techniques described herein relate to a method, wherein the predetermined threshold value is specified by the user.


In some aspects, the techniques described herein relate to a method, wherein the transaction request message corresponds to an online transaction initiated from the mobile device.


In some aspects, the techniques described herein relate to a method, wherein, upon receiving the online transaction request, a two-factor strong verification process is performed by the validation process, the two-factor strong verification process being based on a determination that the transaction timestamp, associated with the online transaction, does not exceed the most recent event timestamp by more than the predefined threshold value.


In some aspects, the techniques described herein relate to a method, further including generating, upon determining that the transaction timestamp exceeds the most recent event timestamp, by more than the predefined threshold value, a user alert notification by the user application running on the mobile device.


In some aspects, the techniques described herein relate to a method, wherein the user alert notification includes a most recent GPS location of the user card corresponding to the most recent event timestamp.


In some aspects, the techniques described herein relate to a method, wherein the monitoring correspond to determining the connectivity status of NFC link as active or inactive.


In some aspects, the techniques described herein relate to a method, wherein a change in the connectivity status of the NFC link from inactive to active corresponds to an insertion of the user card into the card pocket for storage, and a change in the status of the NFC link from inactive to active corresponds to a removal of the user card from the card pocket for conducting an electronic transaction.


In some aspects, the techniques described herein relate to a system for implementing multi-factor transaction authentication based on device proximity monitoring, the system including a structural element for storing a user card within a Near-Field communication (NFC) range of a mobile device running a user application, the system further including a computer hardware arrangement configure to: monitor, by the user application stored on the mobile device, a connectivity status of an NFC link established between the user card, when stored in the structural element, and the mobile device; generate one or more event timestamps associated with one or more detection events, wherein each detection event corresponds to a change in the connectivity status of the NFC link; compare, by a validation process, a most recent event timestamp from the one or more event timestamps, with a transaction timestamp associated with a transaction request message for a transaction initiated by the user card, wherein the one or more event timestamps are transmitted to the validation process by the user application; verify that the transaction timestamp does not exceed the most recent event timestamp by more than a predefined threshold value, wherein the most recent event timestamp corresponds to a removal of the card from the card pocket; and generate a two-factor strong validation response for the transaction request message based on verifying proximity of the user card to the mobile device.


In some aspects, the techniques described herein relate to a system, wherein the computer hardware arrangement configure to record a Global Positioning System (GPS) location coordinates corresponding to a GPS location of the mobile device, at each of the one or more event timestamps.


In some aspects, the techniques described herein relate to a system, wherein the hardware arrangement is further configured to verify, if a GPS location data associated with the most recent event timestamp corresponds to a merchant location identified from the transaction request message.


In some aspects, the techniques described herein relate to a system, wherein the hardware arrangement is further configured to generate a multi-factor strong validation response corresponding to a validation of a merchant location based on verification of the most recent GPS location of the mobile device, and the most recent event timestamp.


In some aspects, the techniques described herein relate to a non-transitory computer-accessible medium including instructions for execution by a computer hardware arrangement, wherein upon execution of the instructions the computer hardware arrangement is configured to perform procedures including: monitoring, by a user application stored on the mobile device, a connectivity status of an NFC link established between a user card and a mobile device, wherein the user card is stored in an external storage component affixed to the mobile device and structured to dispose the user card within a Near-Field communication (NFC) field of the mobile device; generating one or more event timestamps associated with one or more detection events, wherein each detection event corresponds to a change in the connectivity status of the NFC link; comparing, by a validation process, a most recent event timestamp from the one or more event timestamps, with a transaction timestamp associated with a transaction request message for a transaction initiated by the user card, wherein the one or more event timestamps are transmitted to the validation process by the user application; verifying that the transaction timestamp does not exceed the most recent event timestamp by more than a predefined threshold value, wherein the most recent event timestamp corresponds to a removal of the card from the card pocket; and generating a two-factor strong validation response for the transaction request message based on verifying proximity of the user card to the mobile device.


In some aspects, the techniques described herein relate to a non-transitory computer-accessible medium, further including instructions to record a Global Positioning System (GPS) location coordinates corresponding to a GPS location of the mobile device, at each of the one or more event timestamps.


In some aspects, the techniques described herein relate to a non-transitory computer-accessible medium, further including instructions to verify, if a GPS location data associated with the most recent event timestamp corresponds to a merchant location identified from the transaction request message.


As used herein, the term “card” is not limited to a particular type of card. Rather, it is understood that the term “card” can refer to a contact-based card, a contactless card, or any other card, unless otherwise indicated. It is further understood that the present disclosure is not limited to cards having a certain purpose (e.g., payment cards, gift cards, identification cards, membership cards, transportation cards, access cards), to cards associated with a particular type of account (e.g., a credit account, a debit account, a membership account), or to cards issued by a particular entity (e.g., a commercial entity, a financial institution, a government entity, a social club). Instead, it is understood that the present disclosure includes cards having any purpose, account association, or issuing entity.


The present disclosure is not to be limited in terms of the particular embodiments described in this application, which are intended as illustrations of various aspects. Many modifications and variations can be made without departing from its spirit and scope, as may be apparent. Functionally equivalent methods and apparatuses within the scope of the disclosure, in addition to those enumerated herein, may be apparent from the foregoing representative descriptions. Such modifications and variations are intended to fall within the scope of the appended representative claims. The present disclosure is to be limited only by the terms of the appended representative claims, along with the full scope of equivalents to which such representative claims are entitled. It is also to be understood that the terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting.


It is further noted that the systems and methods described herein may be tangibly embodied in one of more physical media, such as, but not limited to, a compact disc (CD), a digital versatile disc (DVD), a floppy disk, a hard drive, read only memory (ROM), random access memory (RAM), as well as other physical media capable of data storage. For example, data storage may include random access memory (RAM) and read only memory (ROM), which may be configured to access and store data and information and computer program instructions. Data storage may also include storage media or other suitable type of memory (e.g., such as, for example, RAM, ROM, programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), magnetic disks, optical disks, floppy disks, hard disks, removable cartridges, flash drives, any type of tangible and non-transitory storage medium), where the files that comprise an operating system, application programs including, for example, web browser application, email application and/or other applications, and data files may be stored. The data storage of the network-enabled computer systems may include electronic information, files, and documents stored in various ways, including, for example, a flat file, indexed file, hierarchical database, relational database, such as a database created and maintained with software from, for example, Oracle® Corporation, Microsoft® Excel file, Microsoft® Access file, a solid state storage device, which may include a flash array, a hybrid array, or a server-side product, enterprise storage, which may include online or cloud storage, or any other storage mechanism. Moreover, the figures illustrate various components (e.g., servers, computers, processors, etc.) separately. The functions described as being performed at various components may be performed at other components, and the various components may be combined or separated. Other modifications also may be made.


In the preceding specification, various embodiments have been described with references to the accompanying drawings. It will, however, be evident that various modifications and changes may be made thereto, and additional embodiments may be implemented, without departing from the broader scope of the invention as set forth in the claims that follow. The specification and drawings are accordingly to be regarded as an illustrative rather than restrictive sense.

Claims
  • 1. A method for incorporating device proximity monitoring in multi-factor authentication, the method comprising: providing a mobile device associated with a user, with an external card pocket, structured to store a user card within a Near-Field communication (NFC) field of the mobile device;monitoring, by a user application stored on the mobile device, a connectivity status of an NFC link established between the user card, disposed in the external card pocket, and the mobile device;generating one or more event timestamps associated with one or more detection events, wherein each detection event corresponds to a change in the connectivity status of the NFC link;comparing, by a validation process, a most recent event timestamp from the one or more event timestamps, with a transaction timestamp associated with a transaction request message for a transaction initiated by the user card, wherein the one or more event timestamps are transmitted to the validation process by the user application;verifying that the transaction timestamp does not exceed the most recent event timestamp by more than a predefined threshold value, wherein the most recent event timestamp corresponds to a removal of the card from the external card pocket; andgenerating a two-factor strong validation response for the transaction request message based on verifying proximity of the user card to the mobile device.
  • 2. The method of claim 1, further comprising recording a Global Positioning System (GPS) location coordinates corresponding to a GPS location of the mobile device, at each of the one or more event timestamps.
  • 3. The method of claim 2, wherein a most recent GPS location of the mobile device corresponds to a most recently recorded timestamp.
  • 4. The method of claim 3, further comprising, verifying, by the validation process, that the most recent GPS location of the mobile device corresponds to a merchant location identified from the transaction request message.
  • 5. The method of claim 4, further comprising, generating, by the validation process, a multi-factor strong validation response corresponding to a verification of a merchant location based on verification of the most recent GPS location of the mobile device and the most recent event timestamp.
  • 6. The method of claim 1, wherein the user application comprises one or more application components running on a remote validation server associated with the validation process.
  • 7. The method of claim 1, wherein the predefined threshold value is specified by the user.
  • 8. The method of claim 1, wherein the transaction request message corresponds to an online transaction initiated from the mobile device.
  • 9. The method of claim 8, wherein, upon receiving an online transaction request for the online transaction, a two-factor strong verification process is performed by the validation process, the two-factor strong verification process being based on a determination that the transaction timestamp, associated with the online transaction, does not exceed the most recent event timestamp by more than the predefined threshold value.
  • 10. The method of claim 1, further comprising generating, upon determining that the transaction timestamp exceeds the most recent event timestamp, by more than the predefined threshold value, a user alert notification by the user application running on the mobile device.
  • 11. The method of claim 10, wherein the user alert notification includes a most recent GPS location of the user card corresponding to the most recent event timestamp.
  • 12. The method of claim 1, wherein the monitoring correspond to determining the connectivity status of NFC link as active or inactive.
  • 13. The method of claim 12, wherein a change in the connectivity status of the NFC link from inactive to active corresponds to an insertion of the user card into the external card pocket for storage, and a change in the status of the NFC link from inactive to active corresponds to a removal of the user card from the external card pocket for conducting an electronic transaction.
  • 14. A system for implementing multi-factor transaction authentication based on device proximity monitoring, the system comprising a structural element for storing a user card within a Near-Field communication (NFC) range of a mobile device running a user application, the system further comprising a computer hardware arrangement configured to: monitor, by the user application stored on the mobile device, a connectivity status of an NFC link established between the user card, when stored in the structural element, and the mobile device;generate one or more event timestamps associated with one or more detection events, wherein each detection event corresponds to a change in the connectivity status of the NFC link;compare, by a validation process, a most recent event timestamp from the one or more event timestamps, with a transaction timestamp associated with a transaction request message for a transaction initiated by the user card, wherein the one or more event timestamps are transmitted to the validation process by the user application;verify that the transaction timestamp does not exceed the most recent event timestamp by more than a predefined threshold value, wherein the most recent event timestamp corresponds to a removal of the card from the structural element; andgenerate a two-factor strong validation response for the transaction request message based on verifying proximity of the user card to the mobile device.
  • 15. The system of claim 14, wherein the computer hardware arrangement is configured to record a Global Positioning System (GPS) location coordinates corresponding to a GPS location of the mobile device, at each of the one or more event timestamps.
  • 16. The system of claim 15, wherein the hardware arrangement is further configured to verify, if a GPS location data associated with the most recent event timestamp corresponds to a merchant location identified from the transaction request message.
  • 17. The system of claim 16, wherein the hardware arrangement is further configured to generate a multi-factor strong validation response corresponding to a validation of a merchant location based on verification of the most recent GPS location of the mobile device, and the most recent event timestamp.
  • 18. A non-transitory computer-accessible medium comprising instructions for execution by a computer hardware arrangement, wherein upon execution of the instructions the computer hardware arrangement is configured to perform procedures comprising: monitoring, by a user application stored on a mobile device, a connectivity status of an NFC link established between a user card and the mobile device, wherein the user card is stored in an external storage component affixed to the mobile device and structured to dispose the user card within a Near-Field communication (NFC) field of the mobile device;generating one or more event timestamps associated with one or more detection events, wherein each detection event corresponds to a change in the connectivity status of the NFC link;comparing, by a validation process, a most recent event timestamp from the one or more event timestamps, with a transaction timestamp associated with a transaction request message for a transaction initiated by the user card, wherein the one or more event timestamps are transmitted to the validation process by the user application;verifying that the transaction timestamp does not exceed the most recent event timestamp by more than a predefined threshold value, wherein the most recent event timestamp corresponds to a removal of the user card from the external storage component; andgenerating a two-factor strong validation response for the transaction request message based on verifying proximity of the user card to the mobile device.
  • 19. The non-transitory computer-accessible medium of claim 18, further comprising instructions to record a Global Positioning System (GPS) location coordinates corresponding to a GPS location of the mobile device, at each of the one or more event timestamps.
  • 20. The non-transitory computer-accessible medium of claim 19, further comprising instructions to verify, if a GPS location data associated with the most recent event timestamp corresponds to a merchant location identified from the transaction request message.
US Referenced Citations (550)
Number Name Date Kind
4683553 Mollier Jul 1987 A
4827113 Rikuna May 1989 A
4910773 Hazard et al. Mar 1990 A
5036461 Elliott et al. Jul 1991 A
5363448 Koopman, Jr. et al. Nov 1994 A
5377270 Koopman, Jr. et al. Dec 1994 A
5533126 Hazard Jul 1996 A
5537314 Kanter Jul 1996 A
5592553 Guski et al. Jan 1997 A
5616901 Crandall Apr 1997 A
5666415 Kaufman Sep 1997 A
5764789 Pare, Jr. et al. Jun 1998 A
5768373 Lohstroh et al. Jun 1998 A
5778072 Samar Jul 1998 A
5796827 Coppersmith et al. Aug 1998 A
5832090 Raspotnik Nov 1998 A
5883810 Franklin et al. Mar 1999 A
5901874 Deters May 1999 A
5929413 Gardner Jul 1999 A
5960411 Hartman et al. Sep 1999 A
6021203 Douceur et al. Feb 2000 A
6049328 Vanderheiden Apr 2000 A
6058373 Blinn et al. May 2000 A
6061666 Do et al. May 2000 A
6105013 Curry et al. Aug 2000 A
6199114 White et al. Mar 2001 B1
6199762 Hohle Mar 2001 B1
6216227 Goldstein et al. Apr 2001 B1
6227447 Campisano May 2001 B1
6282522 Davis et al. Aug 2001 B1
6324271 Sawyer et al. Nov 2001 B1
6342844 Rozin Jan 2002 B1
6367011 Lee et al. Apr 2002 B1
6402028 Graham, Jr. et al. Jun 2002 B1
6438550 Doyle et al. Aug 2002 B1
6501847 Helot et al. Dec 2002 B2
6631197 Taenzer Oct 2003 B1
6641050 Kelley et al. Nov 2003 B2
6655585 Shinn Dec 2003 B2
6662020 Aaro et al. Dec 2003 B1
6721706 Strubbe et al. Apr 2004 B1
6731778 Oda et al. May 2004 B1
6779115 Naim Aug 2004 B1
6792533 Jablon Sep 2004 B2
6829711 Kwok et al. Dec 2004 B1
6834271 Hodgson et al. Dec 2004 B1
6834795 Rasmussen et al. Dec 2004 B1
6852031 Rowe Feb 2005 B1
6865547 Brake, Jr. et al. Mar 2005 B1
6873260 Lancos et al. Mar 2005 B2
6877656 Jaros et al. Apr 2005 B1
6889198 Kawan May 2005 B2
6905411 Nguyen et al. Jun 2005 B2
6910627 Simpson-Young et al. Jun 2005 B1
6971031 Haala Nov 2005 B2
6990588 Yasukura Jan 2006 B1
7006986 Sines et al. Feb 2006 B1
7085931 Smith et al. Aug 2006 B1
7127605 Montgomery et al. Oct 2006 B1
7128274 Kelley et al. Oct 2006 B2
7140550 Ramachandran Nov 2006 B2
7152045 Hoffman Dec 2006 B2
7165727 de Jong Jan 2007 B2
7175076 Block et al. Feb 2007 B1
7202773 Oba et al. Apr 2007 B1
7206806 Pineau Apr 2007 B2
7232073 de Jong Jun 2007 B1
7246752 Brown Jul 2007 B2
7254569 Goodman et al. Aug 2007 B2
7263507 Brake, Jr. et al. Aug 2007 B1
7270276 Vayssiere Sep 2007 B2
7278025 Saito et al. Oct 2007 B2
7287692 Patel et al. Oct 2007 B1
7290709 Tsai et al. Nov 2007 B2
7306143 Bonneau, Jr. et al. Dec 2007 B2
7319986 Praisner et al. Jan 2008 B2
7325132 Takayama et al. Jan 2008 B2
7373515 Owen et al. May 2008 B2
7374099 de Jong May 2008 B2
7375616 Rowse et al. May 2008 B2
7380710 Brown Jun 2008 B2
7424977 Smets et al. Sep 2008 B2
7453439 Kushler et al. Nov 2008 B1
7472829 Brown Jan 2009 B2
7487357 Smith et al. Feb 2009 B2
7568631 Gibbs et al. Aug 2009 B2
7584153 Brown et al. Sep 2009 B2
7597250 Finn Oct 2009 B2
7628322 Holtmanns et al. Dec 2009 B2
7652578 Braun et al. Jan 2010 B2
7689832 Talmor et al. Mar 2010 B2
7703142 Wilson et al. Apr 2010 B1
7748609 Sachdeva et al. Jul 2010 B2
7748617 Gray Jul 2010 B2
7748636 Finn Jul 2010 B2
7762457 Bonalle et al. Jul 2010 B2
7789302 Tame Sep 2010 B2
7793851 Mullen Sep 2010 B2
7796013 Murakami et al. Sep 2010 B2
7801799 Brake, Jr. et al. Sep 2010 B1
7801829 Gray et al. Sep 2010 B2
7805755 Brown et al. Sep 2010 B2
7809643 Phillips et al. Oct 2010 B2
7827115 Weller et al. Nov 2010 B2
7828214 Narendra et al. Nov 2010 B2
7848746 Juels Dec 2010 B2
7882553 Tuliani Feb 2011 B2
7900048 Andersson Mar 2011 B2
7908216 Davis et al. Mar 2011 B1
7922082 Muscato Apr 2011 B2
7933589 Mamdani et al. Apr 2011 B1
7949559 Freiberg May 2011 B2
7954716 Narendra et al. Jun 2011 B2
7954723 Charrat Jun 2011 B2
7962369 Rosenberg Jun 2011 B2
7993197 Mamdani et al. Aug 2011 B2
8005426 Huomo et al. Aug 2011 B2
8010405 Bortolin et al. Aug 2011 B1
RE42762 Shin Sep 2011 E
8041954 Plesman Oct 2011 B2
8060012 Sklovsky et al. Nov 2011 B2
8074877 Mullen et al. Dec 2011 B2
8082450 Frey et al. Dec 2011 B2
8095113 Kean et al. Jan 2012 B2
8099332 Lemay et al. Jan 2012 B2
8103249 Markison Jan 2012 B2
8108687 Ellis et al. Jan 2012 B2
8127143 Abdallah et al. Feb 2012 B2
8135648 Oram et al. Mar 2012 B2
8140010 Symons et al. Mar 2012 B2
8141136 Lee et al. Mar 2012 B2
8150321 Winter et al. Apr 2012 B2
8150767 Wankmueller Apr 2012 B2
8186602 Itay et al. May 2012 B2
8196131 von Behren et al. Jun 2012 B1
8215563 Levy et al. Jul 2012 B2
8224753 Atef et al. Jul 2012 B2
8232879 Davis Jul 2012 B2
8233841 Griffin et al. Jul 2012 B2
8245292 Buer Aug 2012 B2
8249654 Zhu Aug 2012 B1
8266451 Leydier et al. Sep 2012 B2
8285329 Zhu Oct 2012 B1
8302872 Mullen Nov 2012 B2
8312519 Bailey et al. Nov 2012 B1
8316237 Felsher et al. Nov 2012 B1
8332272 Fisher Dec 2012 B2
8365988 Medina, III et al. Feb 2013 B1
8369960 Tran et al. Feb 2013 B2
8371501 Hopkins Feb 2013 B1
8381307 Cimino Feb 2013 B2
8391719 Alameh et al. Mar 2013 B2
8417231 Sanding et al. Apr 2013 B2
8439271 Smets et al. May 2013 B2
8475367 Yuen et al. Jul 2013 B1
8489112 Roeding et al. Jul 2013 B2
8511542 Pan Aug 2013 B2
8559872 Butler Oct 2013 B2
8566916 Vernon et al. Oct 2013 B1
8567670 Stanfield et al. Oct 2013 B2
8572386 Takekawa et al. Oct 2013 B2
8577810 Dalit et al. Nov 2013 B1
8583454 Beraja et al. Nov 2013 B2
8589335 Smith et al. Nov 2013 B2
8594730 Bona et al. Nov 2013 B2
8615468 Varadarajan Dec 2013 B2
8620218 Awad Dec 2013 B2
8667285 Coulier et al. Mar 2014 B2
8723941 Shirbabadi et al. May 2014 B1
8726405 Bailey et al. May 2014 B1
8740073 Vijayshankar et al. Jun 2014 B2
8750514 Gallo et al. Jun 2014 B2
8752189 De Jong Jun 2014 B2
8794509 Bishop et al. Aug 2014 B2
8799668 Cheng Aug 2014 B2
8806592 Ganesan Aug 2014 B2
8807440 Von Behren et al. Aug 2014 B1
8811892 Khan et al. Aug 2014 B2
8814039 Bishop et al. Aug 2014 B2
8814052 Bona et al. Aug 2014 B2
8818867 Baldwin et al. Aug 2014 B2
8850538 Vernon et al. Sep 2014 B1
8861733 Benteo et al. Oct 2014 B2
8880027 Darringer Nov 2014 B1
8888002 Chesney et al. Nov 2014 B2
8898088 Springer et al. Nov 2014 B2
8934837 Zhu et al. Jan 2015 B2
8977569 Rao Mar 2015 B2
8994498 Agrafioti et al. Mar 2015 B2
9004365 Bona et al. Apr 2015 B2
9038894 Khalid May 2015 B2
9042814 Royston et al. May 2015 B2
9047531 Showering et al. Jun 2015 B2
9069976 Toole et al. Jun 2015 B2
9081948 Magne Jul 2015 B2
9104853 Venkataramani et al. Aug 2015 B2
9117242 Ellis et al. Aug 2015 B1
9118663 Bailey et al. Aug 2015 B1
9122964 Krawczewicz Sep 2015 B2
9129280 Bona et al. Sep 2015 B2
9152832 Royston et al. Oct 2015 B2
9203800 Izu et al. Dec 2015 B2
9209867 Royston Dec 2015 B2
9251330 Boivie et al. Feb 2016 B2
9251518 Levin et al. Feb 2016 B2
9258715 Borghei Feb 2016 B2
9270337 Zhu et al. Feb 2016 B2
9306626 Hall et al. Apr 2016 B2
9306942 Bailey et al. Apr 2016 B1
9324066 Archer et al. Apr 2016 B2
9324067 Van Os et al. Apr 2016 B2
9332587 Salahshoor May 2016 B2
9338622 Bjontegard May 2016 B2
9373141 Shakkarwar Jun 2016 B1
9379841 Fine et al. Jun 2016 B2
9413430 Royston et al. Aug 2016 B2
9413768 Gregg et al. Aug 2016 B1
9420496 Indurkar Aug 2016 B1
9426132 Alikhani Aug 2016 B1
9432339 Bowness Aug 2016 B1
9455968 Machani et al. Sep 2016 B1
9473509 Arsanjani et al. Oct 2016 B2
9491626 Sharma et al. Nov 2016 B2
9553637 Yang et al. Jan 2017 B2
9619952 Zhao et al. Apr 2017 B1
9635000 Muftic Apr 2017 B1
9665858 Kumar May 2017 B1
9674705 Rose et al. Jun 2017 B2
9679286 Colnot et al. Jun 2017 B2
9680942 Dimmick Jun 2017 B2
9710804 Zhou et al. Jul 2017 B2
9740342 Paulsen et al. Aug 2017 B2
9740988 Levin et al. Aug 2017 B1
9763097 Robinson et al. Sep 2017 B2
9767329 Forster Sep 2017 B2
9769662 Queru Sep 2017 B1
9773151 Mil'shtein et al. Sep 2017 B2
9780953 Gaddam et al. Oct 2017 B2
9891823 Feng et al. Feb 2018 B2
9940571 Herrington Apr 2018 B1
9953323 Candelore et al. Apr 2018 B2
9961194 Wiechman et al. May 2018 B1
9965756 Davis et al. May 2018 B2
9965911 Wishne May 2018 B2
9978058 Wurmfeld et al. May 2018 B2
10043164 Dogin et al. Aug 2018 B2
10075437 Costigan et al. Sep 2018 B1
10129648 Hernandez et al. Nov 2018 B1
10133979 Eidam et al. Nov 2018 B1
10217105 Sangi et al. Feb 2019 B1
20010010723 Pinkas Aug 2001 A1
20010029485 Brody et al. Oct 2001 A1
20010034702 Mockett et al. Oct 2001 A1
20010054003 Chien et al. Dec 2001 A1
20020078345 Sandhu et al. Jun 2002 A1
20020093530 Krothapalli et al. Jul 2002 A1
20020100808 Norwood et al. Aug 2002 A1
20020120583 Keresman, III et al. Aug 2002 A1
20020152116 Yan et al. Oct 2002 A1
20020153424 Li Oct 2002 A1
20020165827 Gien et al. Nov 2002 A1
20030023554 Yap et al. Jan 2003 A1
20030034873 Chase et al. Feb 2003 A1
20030055727 Walker et al. Mar 2003 A1
20030078882 Sukeda et al. Apr 2003 A1
20030167350 Davis et al. Sep 2003 A1
20030208449 Diao Nov 2003 A1
20040015958 Veil et al. Jan 2004 A1
20040039919 Takayama et al. Feb 2004 A1
20040127256 Goldthwaite et al. Jul 2004 A1
20040215674 Odinak et al. Oct 2004 A1
20040230799 Davis Nov 2004 A1
20050044367 Gasparini et al. Feb 2005 A1
20050075985 Cartmell Apr 2005 A1
20050081038 Arditti Modiano et al. Apr 2005 A1
20050138387 Lam et al. Jun 2005 A1
20050156026 Ghosh et al. Jul 2005 A1
20050160049 Lundholm Jul 2005 A1
20050195975 Kawakita Sep 2005 A1
20050247797 Ramachandran Nov 2005 A1
20060006230 Bear et al. Jan 2006 A1
20060040726 Szrek et al. Feb 2006 A1
20060041402 Baker Feb 2006 A1
20060044153 Dawidowsky Mar 2006 A1
20060047954 Sachdeva et al. Mar 2006 A1
20060085848 Aissi et al. Apr 2006 A1
20060136334 Atkinson et al. Jun 2006 A1
20060173985 Moore Aug 2006 A1
20060174331 Schuetz Aug 2006 A1
20060242698 Inskeep et al. Oct 2006 A1
20060280338 Rabb Dec 2006 A1
20070033642 Ganesan et al. Feb 2007 A1
20070055630 Gauthier et al. Mar 2007 A1
20070061266 Moore et al. Mar 2007 A1
20070061487 Moore et al. Mar 2007 A1
20070116292 Kurita et al. May 2007 A1
20070118745 Buer May 2007 A1
20070197261 Humbel Aug 2007 A1
20070224969 Rao Sep 2007 A1
20070241182 Buer Oct 2007 A1
20070256134 Lehtonen et al. Nov 2007 A1
20070258594 Sandhu et al. Nov 2007 A1
20070278291 Rans et al. Dec 2007 A1
20080008315 Fontana et al. Jan 2008 A1
20080011831 Bonalle et al. Jan 2008 A1
20080014867 Finn Jan 2008 A1
20080035738 Mullen Feb 2008 A1
20080071681 Khalid Mar 2008 A1
20080072303 Syed Mar 2008 A1
20080086767 Kulkarni et al. Apr 2008 A1
20080103968 Bies et al. May 2008 A1
20080109309 Landau et al. May 2008 A1
20080110983 Ashfield May 2008 A1
20080120711 Dispensa May 2008 A1
20080156873 Wilhelm et al. Jul 2008 A1
20080162312 Sklovsky et al. Jul 2008 A1
20080164308 Aaron et al. Jul 2008 A1
20080207307 Cunningham, II et al. Aug 2008 A1
20080209543 Aaron Aug 2008 A1
20080223918 Williams et al. Sep 2008 A1
20080285746 Landrock et al. Nov 2008 A1
20080308641 Finn Dec 2008 A1
20090037275 Pollio Feb 2009 A1
20090048026 French Feb 2009 A1
20090132417 Scipioni et al. May 2009 A1
20090143104 Loh et al. Jun 2009 A1
20090171682 Dixon et al. Jul 2009 A1
20090210308 Toomer et al. Aug 2009 A1
20090235339 Mennes et al. Sep 2009 A1
20090249077 Gargaro et al. Oct 2009 A1
20090282264 Amiel et al. Nov 2009 A1
20100023449 Skowronek et al. Jan 2010 A1
20100023455 Dispensa et al. Jan 2010 A1
20100029202 Jolivet et al. Feb 2010 A1
20100033310 Narendra et al. Feb 2010 A1
20100036769 Winters et al. Feb 2010 A1
20100078471 Lin et al. Apr 2010 A1
20100082491 Rosenblatt et al. Apr 2010 A1
20100094754 Bertran et al. Apr 2010 A1
20100095130 Bertran et al. Apr 2010 A1
20100100480 Altman et al. Apr 2010 A1
20100114731 Kingston et al. May 2010 A1
20100192230 Steeves et al. Jul 2010 A1
20100207742 Buhot et al. Aug 2010 A1
20100211797 Westerveld et al. Aug 2010 A1
20100240413 He et al. Sep 2010 A1
20100257357 McClain Oct 2010 A1
20100312634 Cervenka Dec 2010 A1
20100312635 Cervenka Dec 2010 A1
20110028160 Roeding et al. Feb 2011 A1
20110035604 Habraken Feb 2011 A1
20110060631 Grossman et al. Mar 2011 A1
20110068170 Lehman Mar 2011 A1
20110084132 Tofighbakhsh Apr 2011 A1
20110101093 Ehrensvard May 2011 A1
20110113245 Varadrajan May 2011 A1
20110125638 Davis et al. May 2011 A1
20110131415 Schneider Jun 2011 A1
20110153437 Archer et al. Jun 2011 A1
20110153496 Royyuru Jun 2011 A1
20110208658 Makhotin Aug 2011 A1
20110208965 Machani Aug 2011 A1
20110211219 Bradley Sep 2011 A1
20110218911 Spodak Sep 2011 A1
20110238564 Lim et al. Sep 2011 A1
20110246780 Yeap et al. Oct 2011 A1
20110258452 Coulier et al. Oct 2011 A1
20110280406 Ma et al. Nov 2011 A1
20110282785 Chin Nov 2011 A1
20110294418 Chen Dec 2011 A1
20110312271 Ma et al. Dec 2011 A1
20120024947 Naelon Feb 2012 A1
20120030047 Fuentes et al. Feb 2012 A1
20120030121 Grellier Feb 2012 A1
20120047071 Mullen et al. Feb 2012 A1
20120079281 Lowenstein et al. Mar 2012 A1
20120109735 Krawczewicz et al. May 2012 A1
20120109764 Martin et al. May 2012 A1
20120143754 Patel Jun 2012 A1
20120150737 Rottink Jun 2012 A1
20120178366 Levy et al. Jul 2012 A1
20120196583 Kindo Aug 2012 A1
20120207305 Gallo et al. Aug 2012 A1
20120209773 Ranganathan Aug 2012 A1
20120238206 Singh et al. Sep 2012 A1
20120239560 Pourfallah et al. Sep 2012 A1
20120252350 Steinmetz et al. Oct 2012 A1
20120254394 Barras Oct 2012 A1
20120284194 Liu et al. Nov 2012 A1
20120290472 Mullen et al. Nov 2012 A1
20120296818 Nuzzi et al. Nov 2012 A1
20120316992 Oborne Dec 2012 A1
20120317035 Royyuru et al. Dec 2012 A1
20120317628 Yeager Dec 2012 A1
20130005245 Royston Jan 2013 A1
20130008956 Ashfield Jan 2013 A1
20130013499 Kalgi Jan 2013 A1
20130026229 Jarman et al. Jan 2013 A1
20130048713 Pan Feb 2013 A1
20130054474 Yeager Feb 2013 A1
20130065564 Conner et al. Mar 2013 A1
20130080228 Fisher Mar 2013 A1
20130080229 Fisher Mar 2013 A1
20130099587 Lou Apr 2013 A1
20130104251 Moore et al. Apr 2013 A1
20130106576 Hinman et al. May 2013 A1
20130119130 Braams May 2013 A1
20130130614 Busch-Sorensen May 2013 A1
20130144793 Royston Jun 2013 A1
20130171929 Adams et al. Jul 2013 A1
20130179351 Wallner Jul 2013 A1
20130185772 Jaudon et al. Jul 2013 A1
20130191279 Calman et al. Jul 2013 A1
20130200999 Spodak et al. Aug 2013 A1
20130216108 Hwang et al. Aug 2013 A1
20130226791 Springer et al. Aug 2013 A1
20130226796 Jiang et al. Aug 2013 A1
20130232082 Krawczewicz et al. Sep 2013 A1
20130238894 Ferg et al. Sep 2013 A1
20130282360 Shimota et al. Oct 2013 A1
20130303085 Boucher et al. Nov 2013 A1
20130304651 Smith Nov 2013 A1
20130312082 Izu et al. Nov 2013 A1
20130314593 Reznik et al. Nov 2013 A1
20130344857 Berionne et al. Dec 2013 A1
20140002238 Taveau et al. Jan 2014 A1
20140019352 Shrivastava Jan 2014 A1
20140027506 Heo et al. Jan 2014 A1
20140032409 Rosano Jan 2014 A1
20140032410 Georgiev et al. Jan 2014 A1
20140040120 Cho et al. Feb 2014 A1
20140040139 Brudnicki et al. Feb 2014 A1
20140040147 Varadarakan et al. Feb 2014 A1
20140047235 Lessiak et al. Feb 2014 A1
20140067690 Pitroda et al. Mar 2014 A1
20140074637 Hammad Mar 2014 A1
20140074655 Lim et al. Mar 2014 A1
20140081720 Wu Mar 2014 A1
20140138435 Khalid May 2014 A1
20140171034 Aleksin et al. Jun 2014 A1
20140171039 Bjontegard Jun 2014 A1
20140172700 Teuwen et al. Jun 2014 A1
20140180851 Fisher Jun 2014 A1
20140208112 McDonald et al. Jul 2014 A1
20140214674 Narula Jul 2014 A1
20140229375 Zaytzsev et al. Aug 2014 A1
20140245391 Adenuga Aug 2014 A1
20140256251 Caceres et al. Sep 2014 A1
20140258099 Rosano Sep 2014 A1
20140258113 Gauthier et al. Sep 2014 A1
20140258125 Gerber et al. Sep 2014 A1
20140274179 Zhu et al. Sep 2014 A1
20140279479 Maniar et al. Sep 2014 A1
20140337235 Van Heerden et al. Nov 2014 A1
20140339315 Ko Nov 2014 A1
20140346860 Aubry et al. Nov 2014 A1
20140365780 Movassaghi Dec 2014 A1
20140379361 Mahadkar et al. Dec 2014 A1
20150012444 Brown et al. Jan 2015 A1
20150032635 Guise Jan 2015 A1
20150071486 Rhoads et al. Mar 2015 A1
20150081349 Johndrow et al. Mar 2015 A1
20150088757 Zhou et al. Mar 2015 A1
20150089586 Ballesteros Mar 2015 A1
20150134452 Williams May 2015 A1
20150140960 Powell et al. May 2015 A1
20150154595 Collinge et al. Jun 2015 A1
20150170138 Rao Jun 2015 A1
20150178724 Ngo et al. Jun 2015 A1
20150186871 Laracey Jul 2015 A1
20150205379 Mag et al. Jul 2015 A1
20150302409 Malek Oct 2015 A1
20150317626 Ran et al. Nov 2015 A1
20150332266 Friedlander et al. Nov 2015 A1
20150339474 Paz et al. Nov 2015 A1
20150371234 Huang et al. Dec 2015 A1
20160012465 Sharp Jan 2016 A1
20160026997 Tsui et al. Jan 2016 A1
20160048913 Rausaria et al. Feb 2016 A1
20160055480 Shah Feb 2016 A1
20160057619 Lopez Feb 2016 A1
20160065370 Le Saint et al. Mar 2016 A1
20160087957 Shah et al. Mar 2016 A1
20160092696 Guglani et al. Mar 2016 A1
20160148193 Kelley et al. May 2016 A1
20160232523 Venot et al. Aug 2016 A1
20160239672 Khan et al. Aug 2016 A1
20160253651 Park et al. Sep 2016 A1
20160255072 Liu Sep 2016 A1
20160267486 Mitra et al. Sep 2016 A1
20160277383 Guyomarc'h et al. Sep 2016 A1
20160277388 Lowe et al. Sep 2016 A1
20160307187 Guo et al. Oct 2016 A1
20160307189 Zarakas et al. Oct 2016 A1
20160314472 Ashfield Oct 2016 A1
20160330027 Ebrahimi Nov 2016 A1
20160335531 Mullen et al. Nov 2016 A1
20160379217 Hammad Dec 2016 A1
20170004502 Quentin et al. Jan 2017 A1
20170011395 Pillai et al. Jan 2017 A1
20170011406 Tunnell et al. Jan 2017 A1
20170017957 Radu Jan 2017 A1
20170017964 Janefalkar et al. Jan 2017 A1
20170024716 Jiam et al. Jan 2017 A1
20170039566 Schipperheijn Feb 2017 A1
20170041759 Gantert et al. Feb 2017 A1
20170068950 Kwon Mar 2017 A1
20170103388 Pillai et al. Apr 2017 A1
20170104739 Lansler et al. Apr 2017 A1
20170109509 Baghdasaryan Apr 2017 A1
20170109730 Locke et al. Apr 2017 A1
20170116447 Cimino et al. Apr 2017 A1
20170124568 Moghadam May 2017 A1
20170140379 Deck May 2017 A1
20170154328 Zarakas et al. Jun 2017 A1
20170154333 Gleeson et al. Jun 2017 A1
20170180134 King Jun 2017 A1
20170230189 Toll et al. Aug 2017 A1
20170237301 Elad et al. Aug 2017 A1
20170262942 Gaddam et al. Sep 2017 A1
20170289127 Hendrick Oct 2017 A1
20170295013 Claes Oct 2017 A1
20170316696 Bartel Nov 2017 A1
20170317834 Smith et al. Nov 2017 A1
20170330173 Woo et al. Nov 2017 A1
20170374070 Shah et al. Dec 2017 A1
20180034507 Wobak et al. Feb 2018 A1
20180039986 Essebag et al. Feb 2018 A1
20180068316 Essebag et al. Mar 2018 A1
20180114216 Joseph et al. Apr 2018 A1
20180129945 Saxena et al. May 2018 A1
20180160255 Park Jun 2018 A1
20180191501 Lindemann Jul 2018 A1
20180205712 Versteeg et al. Jul 2018 A1
20180240106 Garrett et al. Aug 2018 A1
20180254909 Hancock Sep 2018 A1
20180268132 Buer et al. Sep 2018 A1
20180270214 Caterino et al. Sep 2018 A1
20180294959 Traynor et al. Oct 2018 A1
20180300716 Carlson Oct 2018 A1
20180302396 Camenisch et al. Oct 2018 A1
20180315050 Hammad Nov 2018 A1
20180316666 Koved et al. Nov 2018 A1
20180322486 Deliwala et al. Nov 2018 A1
20180359100 Gaddam et al. Dec 2018 A1
20190014107 George Jan 2019 A1
20190019375 Foley Jan 2019 A1
20190036678 Ahmed Jan 2019 A1
20190238517 D'Agostino et al. Aug 2019 A1
20220084032 Koehler et al. Mar 2022 A1
Foreign Referenced Citations (38)
Number Date Country
3010336 Jul 2017 CA
101192295 Jun 2008 CN
103023643 Apr 2013 CN
103417202 Dec 2013 CN
1 085 424 Mar 2001 EP
1 223 565 Jul 2002 EP
1 265 186 Dec 2002 EP
1 783 919 May 2007 EP
2 852 070 Jan 2009 EP
2 139 196 Dec 2009 EP
1 469 419 Feb 2012 EP
2 457 221 Aug 2009 GB
2 516 861 Feb 2015 GB
2 551 907 Jan 2018 GB
101508320 Apr 2015 KR
WO 0049586 Aug 2000 WO
WO 2006070189 Jul 2006 WO
WO 2008055170 May 2008 WO
WO 2009025605 Feb 2009 WO
WO 2010049252 May 2010 WO
WO 2011112158 Sep 2011 WO
WO 2012001624 Jan 2012 WO
WO 2013039395 Mar 2013 WO
WO 2013155562 Oct 2013 WO
WO 2013192358 Dec 2013 WO
WO 2014043278 Mar 2014 WO
WO 2014170741 Oct 2014 WO
WO 2015179649 Nov 2015 WO
WO 2015183818 Dec 2015 WO
WO 2016097718 Jun 2016 WO
WO 2016160816 Oct 2016 WO
WO 2016168394 Oct 2016 WO
WO 2017042375 Mar 2017 WO
WO 2017042400 Mar 2017 WO
WO 2017157859 Sep 2017 WO
WO 2017208063 Dec 2017 WO
WO 2018063809 Apr 2018 WO
WO 2018137888 Aug 2018 WO
Non-Patent Literature Citations (43)
Entry
Pourghomi, Pardis et al., A Proposed NFC Payment Application, 2013, International Journal of Advanced Computer Science and Applications, vol. 4, No. 8. (Year: 2013).
Batina, Lejla and Poll, Erik, “SmartCards and RFID,” PowerPoint Presentation for IPA Security Course, Digital Security at University of Nijmegen, Netherlands (date unknown), 75 pages.
Haykin M. and Warnar, R., “Smart Card Technology: New Methods for Computer Access Control,” Computer Science and Technology NIST Special Publication 500-157:1-60 (1988).
Lehpamer, Harvey, “Component of the RFID System,” RFID Design Principles, 2nd edition pp. 133-201 (2012).
Pourghomi, Pardis et al., “A Proposed NFC Payment Application,” International Journal of Advanced Computer Science and Applications, vol. 4, No. 8 (2013).
Author Unknown, “CardrefresherSM from American Express®,” [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://merchant-channel.americanexpress.com/merchant/en_US/cardrefresher, 2 pages.
Author Unknown, “Add Account Updater to your recurring payment tool,” [online] 2018-19 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.authorize.net/our-features/account-updater/, 5 pages.
Author Unknown, “Visa® Account Updater for Merchants,” [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://usa.visa.com/dam/VCOM/download/merchants/visa-account-updater-product-information-fact-sheet-for-merchants.pdf, 2 pages.
Author Unknown, “Manage the cards that you use with Apple Pay,” Apple Support [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://support.apple.com/en-us/HT205583, 5 pages.
Author Unknown, “Contactless Specifications for Payment Systems,” EMV Book B—Entry Point Specification [online] 2016 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.emvco.com/wp-content/uploads/2017/05/BookB_Entry_Point_Specification_v2_6_20160809023257319.pdf, 52 pages.
Author Unknown, “EMV Integrated Circuit Card Specifications for Payment Systems, Book 2, Security and Key Management,” Version 3.4, [online] 2011 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.emvco.com/wp-content/uploads/2017/05/EMV_v4.3_Book_2_Security_and_Key_Management_20120607061923900.pdf, 174 pages.
Author unknown, “NFC Guide: All You Need to Know About Near Field Communication” Square Guide [online] 2018 [retrieved on Nov. 13, 2018]. Retrieved from Internet URL: https://squareup.com/guides/nfc, 8 pages.
Profis, S., “Everything you need to know about NFC and mobile payments” CNET Directory [online], 2014 [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://www.cnet.com/how-to/how-nfc-works-and-mobile-payments/, 6 pages.
Cozma, N., “Copy data from other devices in Android 5.0 Lollipop setup” CNET Directory [online] 2014 [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://www.cnet.com/how-to/copy-data-from-other-devices-in-android-5-0-lollipop-setup/, 5 pages.
Kevin, Android Enthusiast, “How to copy text string from nfc tag” StackExchange [online] 2013 [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://android.stackexchange.com/questions/55689/how-to-copy-text-string-from-nfc-tag, 11 pages.
Author unknown, “Tap & Go Device Setup” Samsung [online] date unknown [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://www.samsung.com/us/switch-me/switch-to-the-galaxy-s-5/app/partial/setup-device/tap-go.html, 1 page.
Author Unknown, “Multiple encryption”, Wikipedia [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://en.wikipedia.org/wiki/Multiple_encryption, 4 pages.
Krawczyk, et al., “HMAC: Keyed-Hashing for Message Authentication”, Network Working Group RFC:2104 memo [online] 1997 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://tools.ietf.org/html/rfc2104, 12 pages.
Song, et al., “The AES-CMAC Algorithm”, Network Working Group RFC: 4493 memo [online] 2006 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://tools.ietf.org/html/rfc4493, 21 pages.
Katz, J., and Lindell, Y., “Aggregate Message Authentication Codes”, Topics in Cryptology [online] 2008 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.cs.umd.edu/˜jkatz/papers/aggregateMAC.pdf, 11 pages.
Adams, D., and Maier, A-K, “Goldbug Big Seven open source crypto-messengers to be compared—: or Comprehensive Confidentiality Review & Audit of GoldBug Encrypting E-Mail-Client & Secure Instant Messenger”, Big Seven Study 2016 [online] [retrieved on Mar. 25, 2018]. Retrieved from Internet URL: https://sf.net/projects/goldbug/files/bigseven-crypto-audit.pdf, 309 pages.
Author Unknown, “Triple DES”, Wikipedia [online] 2018 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://simple.wikipedia.org/wiki/Triple_DES, 2 pages.
Song, F., and Yun, A.l, “Quantum Security of NMAC and Related Constructions—PRF domain extension against quantum attacks”, IACR Cryptology ePrint Archive [online] 2017 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://eprint.iacr.org/2017/509.pdf, 41 pages.
Saxena, N., “Lecture 10: NMAC, HMAC and Number Theory”, CS 6903 Modern Cryptography [online] 2008 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: http://isis.poly.edu/courses/cs6903/Lectures/lecture10.pdf, 8 pages.
Berg, Guy, “Fundamentals of EMV” Smart Card Alliance [online] date unknown [retrieved on Mar. 27, 2019]. Retrieved from Internet URL: https://www.securetechalliance.org/resources/media/scap13_preconference/02.pdf, 37 pages.
Pierce, Kevin, “Is the amazon echo NFC compatible,?” Amazon.com Customer Q&A [online] 2016 [retrieved on Mar. 26, 2019]. Retrieved from Internet URL: https://www.amazon.com/ask/questions/Tx1RJXYSPE6XLJD?_encodi . . . , 2 pages.
Author Unknown, “Multi-Factor Authentication”, idaptive [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.centrify.com/products/application-services/adaptive-multi-factor-authentication/risk-based-mfa/, 10 pages.
Author Unknown, “Adaptive Authentication”, SecureAuth [online] 2019 [retrieved on Mar. 25, 2019}. Retrieved from Internet URL: https://www.secureauth.com/products/access-management/adaptive-authentication, 7 pages.
Van den Breekel, J., et al., “EMV in a nutshell”, Technical Report, 2016 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.cs.ru.nl/E.Poll/papers/EMVtechreport.pdf, 37 pages.
Author Unknown, “Autofill”, Computer Hope [online] 2018 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.computerhope.com/jargon/a/autofill.htm, 2 pages.
Author Unknown, “Fill out forms automatically”, Google Chrome Help [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://support.google.com/chrome/answer/142893?co=GENIE.Platform%3DDesktop&hl=en, 3 pages.
Author unknown, “Autofill credit cards, contacts, and passwords in Safari on Mac”, Apple Safari User Guide [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://support.apple.com/guide/safari/use-autofill-ibrw1103/mac, 3 pages.
Menghin, M.J., “Power Optimization Techniques for Near Field Communication Systems” 2014 Dissertation at Technical University of Graz [online]. Retrieved from Internet URL: https://diglib.tugraz.at/download.php?id=576a7b910d2d6&location=browse, 135 pages.
Mareli, M., et al., “Experimental evaluation of NFC reliability between an RFID tag and a smartphone” Conference paper (2013) IEEE AFRICON At Mauritius [online] [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://core.ac.uk/download/pdf/54204839.pdf, 5 pages.
Davison, A., et al., “MonoSLAM: Real-Time Single Camera SLAM”, IEEE Transactions on Pattern Analysis and Machine Intelligence 29(6): 1052-1067 (2007).
Barba, R., “Sharing your location with your bank sounds creepy, but it's also useful”, Bankrate, LLC [online] 2017 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.bankrate.com/banking/banking-app-location-sharing/, 6 pages.
Author unknown: “onetappayment™”, [online] Jan. 24, 2019, [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.payubiz.in/onetap, 4 pages.
Vu et al., (2012). “Distinguishing users with capacitive touch communication” Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM. 10.1145/2348543.2348569.
EMVCo, EMV Card Personalization Specification, version 1.0 (Jun. 2003), 81 pages.
Ullmann et al., (2012). “On-Card” User Authentication for Contactless Smart Cards based on Gesture Recognition, LNI, 223-234, 12 pages.
Faraj et al. (2008). “Investigation of Java Smart Card Technology for Multi-Task Applications” J. of Al-Anbar University for Pure Science, vol. 2: No. 1: 2008, 11 pages.
Dhamdhere (2017) “Key Benefits of a Unified Platform for Loyalty, Referral Marketing, and UGC” Annex Cloud [retrieved on Jul. 3, 2019]. Retrieved from Internet URL: https://www.annexcloude.com/blog/benefits-unified-platform/, 13 pages.
The International Search Report and Written Opinion mailed Apr. 17, 2024, for corresponding PCT/US24/11389 (eight (8) pages).
Related Publications (1)
Number Date Country
20240242221 A1 Jul 2024 US