Systems and methods for transaction card-based authentication

Information

  • Patent Grant
  • 12143515
  • Patent Number
    12,143,515
  • Date Filed
    Friday, March 26, 2021
    4 years ago
  • Date Issued
    Tuesday, November 12, 2024
    6 months ago
Abstract
A method is provided for communicating with a transaction card having a card data processor, a near card field communication (NFC) interface, and a card memory having a unique card identifier stored therein. In this method, a user communication device establishes an NFC session with the transaction card and transmits to the transaction card an NFC data exchange format (NDEF) WRITE TAG command including session-specific challenge information. The user communication device transmits to the transaction card an NDEF READ TAG command and receives from the transaction card, card-specific challenge response information. The challenge response information is then used to authenticate the transaction card.
Description
FIELD OF THE INVENTION

The present disclosure relates generally to transaction security and, more specifically, to exemplary systems, methods, and computer-accessible mediums for using a transaction card to carry out a challenge response security protocol.


BACKGROUND OF THE INVENTION

The development of electronic commerce has led to the convenience of consumers and businesses alike. Transactions may be conducted between and among parties from virtually any location and at any time. Use of cards such as credit and debit cards has enhanced the ability to conduct transactions over networks, as consumers may engage in purchase transactions, or conduct other business, merely by providing credentials including a name, a card number, and other data such as, for example, a card expiration date, a card security code, or a billing zip code.


But the increasing use of cards has also resulted in increased risk of fraud or theft. Despite efforts to make card-based transactions more secure, smart cards and other devices may often be vulnerable to replay attacks in which card and/or transaction information is intercepted and subsequently used in a fraudulent manner to carry out additional transactions.


SUMMARY OF THE INVENTION

An illustrative aspect of the invention provides a method of communicating with a transaction card having a card data processor, a near card field communication (NFC) interface, and a card memory having a unique card identifier stored therein. The method comprises establishing, by a user communication device, a first NFC session with the transaction card and transmitting, by the user communication device to the transaction card, an NFC data exchange format (NDEF) WRITE TAG command including session-specific; challenge information. The method further comprises transmitting, by the user communication device to the transaction card, an NDEF READ TAG command and receiving, by the user communication device from the transaction cant card-specific challenge response information. The method also comprises authenticating the transaction card using the challenge response information.


Another aspect of the invention provides a user communication device comprising a communication device data processor and an NFC interface in communication with the data processor. The NFC interface is configured for communication with one or more transaction cards. The user communication device further comprises a communication device memory accessible by the data processor and containing a card communication application with instructions to be carried out by the data processor. The communication application is configured to establish a first NEC session with a transaction card, and transmit, to the transaction card, an NDEF WRITE. TAG command including session-specific challenge information. The application is further configured to transmit, to the transaction card, an NDEF READ TAG command, receive, from the transaction card, card-specific challenge response information, and authenticate the transaction card.


Another aspect of the invention provides a transaction card comprising a card microprocessor, a near field communication (NFC) interface, and a card memory having a card identifier and one or more applets stored therein. The one or more applets include instructions for the card microprocessor to receive, from a user communication device via the NFC interface, an NDEF WRITE TAG command including challenge information and generate a digital signature using the challenge information. The one or more applets include further instructions to receive, from the user communication device via the NFC interface, an NDEF READ TAG command, and transmit, to the user communication device, the digital signature.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a flow chart of actions in a method of communicating with a transaction card according to an embodiment of the invention;



FIG. 2 is a flow chart of actions in a method of authenticating a communication between a transaction card and a user communication device according to an embodiment of the invention;



FIG. 3 is a schematic representation of a transaction card authentication system according to an embodiment of the invention; and



FIG. 4 is a block diagram of a transaction card microprocessor chip according to an embodiment of the invention.





DETAILED DESCRIPTION OF THE INVENTION

The following description of embodiments provides non-limiting representative examples referencing numerals to particularly describe features and teachings of different aspects of the invention. While the invention will be described in connection with particular embodiments and environments, it will be understood that the invention is not limited to these embodiments and environments. On the contrary, it is contemplated that various alternatives, modifications and equivalents are included within the spirit and scope of the invention as described. Further, the embodiments described should be recognized as being capable of separate implementation or of combination with other embodiments.


As used herein, the term “transaction card” refers to any identification or payment card associated with a user or user account. This may include, in particular, a credit card, debit card, or gift card, any of which may be issued by a service provider. Smart transaction cards are often used to carry out transactions through near field communication (NFC) or brief contact communication (e.g., “tapping”) with transaction processing devices. Because of inherent limitations in the transaction processing device, such cards may not be suitable for use in authentication, except as part of a low-level protocol.


The present invention provides an approach that enhances the value of a smart transaction card in carrying out a multi-factor security protocol. This approach involves a challenge response protocol that makes use of a user processing device's ability to transmit NFC data exchange format (NDEF) WRITE and READ commands to the transaction card. In methods of the invention, the user may establish an NFC communication session between the transaction card and the user device (e.g., by tapping or otherwise bringing the user device within communication range of the card). The user device transmits a WRITE NDEF to the transaction card. The transaction card reads the information from the WRITE command and uses it to create a digital signature. The user device then transmits a READ NDEF command to the transaction card, whereupon the transaction card transmits the digital signature to the user device. The signature may be accompanied by a certificate signed by a trusted authority. The user device may then itself validate the card signature or may pass the signature to a validation system. In either case, validation of the signature could be used for authentication of the presence of the transaction card and/or as an authentication factor in a multi-factor authentication of the user.



FIG. 1 illustrates a basic method M100 of communication between a user communication device and a transaction card. The method M100 can be used as part of a user and/or card authentication process. As will be discussed in more detail hereafter, transaction cards usable in methods of the invention may have a card data processor, a near field communication interface and a card memory. The card memory may have card-unique information stored therein, including a unique card identifier. In some embodiments, the card memory may have one or more encryption keys stored therein. The user communication device may be any data processing device having near field communication capability and will typically be a network-enabled computer system. As used herein, the term network-enabled computer system (and/or device) may include, but is not limited to, any computer device, or communications device including, a server, a microprocessor or system of microprocessors, a network appliance, a personal computer (PC), a workstation, and a mobile processing device such as a smart phone, smart pad, handheld PC, or personal digital assistant (PDA). In some examples, the computer device may use instructions stored on a computer-accessible medium (e.g., a storage device such as a hard disk, floppy disk, memory stick, CD-ROM, RAM, ROM, etc., or a collection thereof). The computer-accessible medium can contain executable instructions thereon. In addition or alternatively, a storage arrangement can be provided separately from the computer-accessible medium, which can provide the instructions to the processing arrangement so as to configure the processing arrangement to execute certain exemplary procedures, processes, and methods, as described herein. Mobile processing devices, in particular, may include NFC capabilities that allow for communication with other NFC-enabled devices by touching the devices together or bringing them into close proximity.


In some embodiments of the invention, the user communication device may be a merchant terminal or other device configured for carrying out financial and other transactions. Such merchant devise may be specifically configured for carrying out transactions based on an account associated with the transaction card and/or the transaction card administrator or processor. In other embodiments of the invention, the user communication device may be a mobile device, which may be associated with a user who is a holder of an account associated with the transaction card.


At S110 of the method M100, an NFC communication session is initiated between the user communication device and the transaction card. This will typically be accomplished by tapping the card to the user communication device or otherwise bringing the card to within NFC communication range of the user communication device. The action of initiating the NFC session may be taken as part of a purchase or other transaction that involves an account associated with the transaction card. In some embodiments, however, the action may be taken as part of an authentication or authorization protocol in conjunction with a transaction that does not otherwise involve an account associated with the transaction card. For example, a purchase may be made from a merchant using another card. The merchant may require authentication of the user/account holder using the smart transaction card, whereupon NFC communication can be established between a merchant terminal and the transaction card.


In some embodiments, the action of establishing NFC communication may be carried out in response to receiving an authentication request from a transaction processing server or authentication server. Such a request may, may be transmitted by the server in response to a request to carry out a transaction requiring verification of the presence of the transaction card or otherwise requiring authentication of the transaction card or the user. Upon receiving the authentication request, the user communication device may display or otherwise convey an instruction to initiate NFC communication with the transaction card.


In embodiments of the invention, the user communication device may include an application for transmitting standardized NDEF messages for communication with NFC-enabled devices. Such methods are used, in particular, for communication with standardized tags (e.g., Radio Frequency Identification (RFID) tags) and include “WRITE TAG” commands for assigning information to a tag and “READ TAG” commands for reading information from a tag. At S120 of the method M100, the user communication device transmits a WRITE TAG command to the transaction card. The WRITE TAG command includes challenge information for use by the transaction card in generating a challenge response. The challenge information may be or include information that is unique to the NFC session. This may include, for example, a one-time, random or pseudo-random or otherwise unpredictable number. The challenge information may be generated by the user communication device or by a requesting processing or authentication server. In some embodiments, the challenge information may be included in an authentication request received by the user communication device from a processing or authentication server. In other cases, the user communication device may transmit NFC session information to a requesting server and receive session-specific challenge information in return.


The user communication device transmits a READ TAG command to the transaction card at S130, and, at S140, receives a transmitted READ TAG response from the transaction card. In some embodiments of the invention, the READ TAG command must be sent to the transaction card within the same NFC communication session as the WRITE TAG command. In such embodiments, termination of the NFC session prior to the READ TAG command would result in termination without authentication of the transaction card. In these circumstances, card authentication would require a new NFC session and new challenge information. In other embodiments, however, the method M100 may include termination of the NFC session (e.g., by removal of the transaction card from NFC communication range) and initiation of a second NFC communication session prior to the action of transmitting the READ TAG command. In some embodiments, such termination and re-initiation of NFC communication may be an allowable occurrence while in others, it may be required.


Whether a single NFC session or multiple sessions are used, the method M100 may include a time limit for transmitting the READ TAG command. This time limit may be based on a predetermined maximum time interval between the transmitting of the WRITE TAG command and the transmitting of the READ TAG command. In embodiments where multiple NFC sessions are allowed or required, a maximum time interval between termination of the first session and initiation of the second session may be specified.


The READ TAG response includes challenge response information that is unique to the transaction card. This may include, for example, a card identifier. The challenge response information may be or include information that is generated by the transaction card's data processing chip using information that is permanently assigned and/or wired into a memory of the transaction card. In particular embodiments, the challenge response information may include information that is encrypted by the card data processing chip. The challenge response information may also include a digital authentication certificate from a trusted source. Such a certificate may be used as a public key in encrypting and decrypting the challenge response information.


At S150, the transaction card is authenticated using the challenge response information. In some embodiments, the authentication action may be carried out entirely by the user communication device. This may include comparing card-unique information to previously stored card information. Alternatively or in addition, authentication may include decrypting information encrypted by the transaction card data processor. Successful decryption would indicate a positive authentication of the transaction card. The foregoing approach may require, however, that one or more private encryption keys stored in the transaction card memory would also need to be available to the user communication device. To avoid this requirement, in some embodiments, the user communication device may transmit some or all of the challenge response information to an authentication-requesting server or directly to an authentication server having access to card-specific encryption keys. In such embodiments, the user communication device may receive back an authentication response indicating that the transaction card has been authenticated or that authentication failed.


In embodiments where authentication is carried out by the user communication device, the method M100 may further include transmitting the results of the authentication to a requesting processing server or authentication server.



FIG. 2 illustrates a basic method M200 for a smart transaction card to authenticate communication with a user communication device according to an illustrative embodiment of the invention. A typical transaction card usable to carry out the method M200 has a card data processor, an NFC interface, and a card memory having a unique card identifier stored therein. In some embodiments, the card memory may also have one or more card-unique encryption keys stored therein. At S210, of the method M200, an NFC communication session is established between the card data processor and a user communication device. The user communication device may be, for example, a merchant transaction terminal, a mobile user device, or other network-enabled device or system. The NFC communication session may be initiated by tapping the card to the user communication device or otherwise bringing the card to within NFC communication range of the user communication device. At S220, the card data processor receives a WRITE TAG command from the user communication device via the card's NFC interface. The WRITE TAG command includes challenge information, which may be or include information that is unique to the NFC session. This may include, for example, a one-time, random or pseudo-random or otherwise unpredictable number.


At S230, the card data processor uses the challenge information to generate a challenge response. The challenge response information may be or include a card-unique and/or session-unique signature. In particular embodiments, the signature may be or include information from the challenge information that has been encrypted by the card processor using one or more card-unique encryption keys. A public key (e.g., a trusted source certificate) may also be used in the encryption. The challenge response may also include a card identifier and/or a public key used in the encryption of challenge information.


The card data processor receives a READ TAG command from the user communication device via the card NFC interface at S240 and transmits the challenge response back to the user communication device at S250.


With reference now to FIG. 3, an exemplary transaction card authentication system 100 according to an embodiment of the invention may include a user device 110, a transaction card 150, a processing server 120 and a card information database 140. The user device 110 may communicate with the processing server 120 via a network 105. The processing server 120 and/or user device 110 may also communicate with an authentication server 130. Although FIG. 3 illustrates certain components connected in certain ways, system 100 may include additional or multiple components connected in various ways. In particular, the system 100 may include multiple user devices 110 and multiple transaction cards 150.


The systems and components of the system 100 may be or include network-enabled computer devices and systems that are configured for processing account-related transactions. In particular, these systems may be configured to execute one or more software applications to, for example, receive data as input from an entity accessing the network-enabled computer system, process received data, transmit data over a network, and receive data over a network in order to process transactions originating from a merchant transaction device or an account holder's device. The various network-enabled computer systems may also include one or more software applications to transmit notifications to account holders (e.g., via the account holders' computer systems or mobile devices). It will be understood that the depiction in FIG. 3 is an example only, and the functions and processes described herein may be performed by any number of network-enabled computers. It will also be understood that where the illustrated system 100 may have only a single instance of certain components, multiple instances of these components may be used. The system 100 may also include other devices not depicted in FIG. 3.


In the example embodiments presented herein, an account holder may be any individual or entity that desires to conduct a transaction (which may be, but is not limited to a financial transaction) with a merchant using a transaction account. An account may be held by any place, location, object, entity, or other mechanism for holding money or performing transactions in any form, including, without limitation, electronic form. An account may be associated with one or more transaction cards such as, for example, a credit or debit card or a prepaid card.


The various components of the system 100 may, in particular, be configured for processing transactions involving the use of a transaction card such as the smart transaction card 150. The transaction card 150 may be any device having a processor configured for communicating via NFC and carrying out digital transactions and having a memory in which identification and encryption information can be stored. This may include chip-carrying transaction cards (“smart” cards), and mobile and non-mobile user computing devices. As illustrated in FIGS. 3 and 4, a typical transaction card 150 that is usable in various embodiments of the invention is a smart card with a microprocessor chip 151. The microprocessor chip 151 includes processing circuitry for storing and processing information, including a microprocessor 152 and a memory 156. It will be understood that the processing circuitry may contain additional components, including processors, memories, error and parity/CRC checkers, data encoders, anticollision algorithms, controllers, command decoders, security primitives and tamper-proofing hardware, as necessary to perform the functions described herein. The memory 156 may be a read-only memory, write-once read-multiple memory or read/write memory, e.g., RAM, ROM, and EEPROM, and the chip 151 may include one or more of these memories. The memory 156 may be configured to store one or more software applications for execution by the microprocessor 152. Information associated with an account may also be stored in the memory 156. In particular, the memory 156 may have permanently stored therein a unique alphanumeric identifier and one or more public and private card encryption keys.


The microprocessor chip 151 further includes an NFC interface 154 configured for establishing communication with the user device 110 or other devices when the card 150 is within a predetermined NFC range. In some embodiments, the NFC interface 154 may comprise a radio frequency identification chip configured to communicate via NFC or other short-range protocols. In some embodiments, the microprocessor chip 151 may include circuitry configured for communication with the user device 110 via other means such as Bluetooth, satellite, Wi-Fi, wired communications, and/or any combination of wireless and wired connections.


In particular embodiments, the memory 156 of the chip 151 microprocessor chip 151 may have stored therein one or more applets with instructions for generating encrypted information and transmitting it to a receiving device (e.g., the user device 110) via the NFC interface 154. Such encrypted information may be or include an encrypted verification block or signature that may be used by the user device 110 or the processing server 120 to authenticate and verify the presence of the transaction card 150.


The memory 156 may, in particular, have an authentication application stored therein having instructions for the data processor 152 to establish an NFC communication session with a user communication device 110 and receive, via the NFC interface 154, a WRITE TAG command transmitted by the user communication device 110. The application may be configured to recognize the WRITE TAG command as an authentication challenge and, upon such recognition, to generate a challenge response based on challenge information included therein. The challenge response may include challenge response information that is unique to the transaction card. This may include, for example, a card identifier. The challenge response information may be or include information that is generated by the data processor 152 using information that is permanently or temporarily stored in the card memory 156. In particular embodiments, the authentication application is configured to cause the processor 152 to generate a digital signature that may be unique to the transaction card 150 and/or the NFC session. The digital signature and/or other challenge response information may be or include a cryptogam encrypted using challenge information received in the WRITE TAG command by the card data processing chip. The cryptogram may be created by the processor 152 using one or more of the public and private encryption keys stored in the memory 156. The challenge response information may also include a digital authentication certificate retrieved from the memory 156.


The authentication application may also be configured to receive a READ TAG command via NFC from the user communication device 110. In response, the application may transmit the challenge response via the NFC interface 154. In some embodiments, the authentication application may be configured so that the action of generating a digital signature and/or other challenge response information is not carried out unless or until a READ TAG command is received. In such embodiments, the actions of generating the challenge response information and transmitting the challenge response information may both be done in response to receiving the READ TAG command. In some embodiments, either or both of these actions may be conditioned on a time interval between the WRITE TAG command and the READ TAG command being less than a specified maximum time interval. If the maximum time interval is exceeded, the microprocessor 152 may transmit a “timed out” error message to the user communication device 110 via the NFC interface 154.


In some embodiments, the authentication application may be configured to terminate the authentication procedure if the NFC session with the user communication device 110 is ended prior to receiving the READ TAG command. In other embodiments, the application may allow or require termination of the initial NFC session after the WRITE TAG command is received and subsequent establishment of a second NFC session in which the READ TAG command is received. As before, transmission of the challenge response may be conditioned on the READ TAG command being received within a maximum time interval after the WRITE TAG command.


The user communication device 110 may be any computer device or communications device including a server, a network appliance, a personal computer (PC), a workstation, and a mobile interface device such as a smart phone, smart pad, handheld PC, or personal digital assistant (PDA). The user communication device 110 may also be a transaction terminal (e.g., a merchant or bank terminal) used for carrying out financial transactions and other interactions with an account holder. The user device 110 includes an on-board data processor 111 in communication with a memory module 113, a user interface 114, a network communication interface 112, and an NFC interface 116. The user device 110 may optionally include an image capturing device 115 (e.g., a digital camera). The data processor 111 may include a microprocessor and associated processing circuitry, and can contain additional components, including processors, memories, error and parity/CRC checkers, data encoders, anticollision algorithms, controllers, command decoders, security primitives and tamper-proofing hardware, as necessary to perform the functions described herein. The memory 113 can be a read-only memory, write-once read-multiple memory or read/write memory, e.g., RAM, ROM and EEPROM, and the user device 110 can include one or more of these memories.


The user interface 114 of the device 110 includes a user input mechanism, which can be any device for entering information and instructions into the user device 110, such as a touch-screen, keyboard, mouse, cursor-control device, microphone, stylus, or digital camera. The user interface 114 may also include a display, which can be any type of device for presenting visual information such as a computer monitor, a flat panel display, and a mobile device screen, including liquid crystal displays, light-emitting diode displays, plasma panels, and cathode ray tube displays.


The network communication interface 112 is configured to establish and support wired or wireless data communication capability for connecting the device 110 to the network 105 or other communication network. The communication interface 112 can also be configured to support communication with a short-range wireless communication interface for communication via a short-range system such as Bluetooth.


The user device NFC interface 116 is configured for establishing near field communication with other NFC-enabled devices including, in particular, the data processing chip 151 of the transaction card 150. The NFC interface 116 is further configured for transmitting information to and receiving information transmitted by the data processing chip 151 via the chip NFC interface 154.


In embodiments of the invention, the memory 113 may have stored therein one or more applications usable by the data processor 111 to conduct and/or monitor transactions between the user device 110 and one or more processing servers 120 and authentication servers 130 over the network 105 and/or one or more merchant transaction terminals (not shown) via NFC, short-range communication, or the network 105. These applications may include instructions usable by the data processor 111 to identify transaction events, store event data in the memory 113, and communicate event data to the servers 120, 130. Some applications may also include instructions relating to receiving and interpreting instructions from the one or more processing servers 120 or the one or more authentication servers 130.


In particular embodiments, the memory 113 may include one or more applets configured for writing NDEF formatted information to NFC enabled tag devices (e.g., RFID tags) and/or for reading formatted information from such devices. These applets may include, in particular, instructions for executing a WRITE TAG command that causes formatted information to be transmitted to and stored in a memory of a receiving tag and instructions for executing a READ TAG command that causes formatted information to be transmitted by the tag and received by the user device 110. The memory 113 may also have stored therein a card communication application that can invoke the NDEF applets for use in a communication session with the transaction card 150. The card communication application may include instructions for the data processor 111 to establish a first NFC session with the transaction card 150 via the NFC interface 116 and then to transmit an NDEF WRITE TAG command to the transaction card 150 via the NFC interface 116. The application may also include instructions to assemble or receive session-specific challenge information that may be formatted for transmission via the NDEF WRITE TAG command. Such challenge information could include, for example, a session identifier or time stamp to differentiate the NFC session from other sessions. The challenge information may instead or in addition include information specific to an intended transaction card 150, the presence of which is required for completion of an authentication or authorization process. The challenge information may be generated by the data processor 111 using information received by the data processor 111 from a processing server 120 or authentication server 130 via the network communication interface 112 and/or information stored in the memory 113.


In some embodiments, the application may be configured to receive an authentication request from a transaction processing server 120 or authentication server 130. Such a request may, may be transmitted by the server in response to a request to carry out a transaction requiring verification of the presence of a particular transaction card 150 or otherwise requiring authentication of the transaction card 150 or the user. Such a request may include challenge information to be included in the WRITE TAG command. The application may be further configured to display information and instructions to the user of the user communication device 110 via the user interface 114. User instructions could include, for example, an instruction to initiate NFC communication with the transaction card 150.


The card communication application may further include instructions for the data processor 111 to transmit an NDEF READ TAG command to the transaction card 150 and to receive formatted response information from the transaction card 150 in return. The response information may include a card identifier and/or challenge response information constructed by the transaction card 150 using the challenge information. The application may also include instructions for the data processor 111 to use the challenge response information to authenticate the transaction card 150. This may be accomplished by direct comparison of the challenge response information to expected response information stored in the memory 113 or received from a requesting processing server 120 or authentication server 130.


In some embodiments, the action to authenticate the transaction card 150 may include transmitting the challenge response information to the authentication server 130 and receiving an authentication response back from the authentication server 130. In some embodiments, the challenge response information may be transmitted directly to the authentication server 130 via the network 105. In other embodiments, the user communication device 110 may transmit the challenge response information to the processing server 120 via the network 105 and the processing server 120, in turn, transmits the challenge response information to the authentication server 130.


In some embodiments, the challenge response information authentication may include information encrypted by the transaction card using card or account-associated encryption keys. In such embodiments, the card communication application may be configured to retrieve the required encryption key(s) from the memory 113 and to use them to decrypt the encrypted information. The application may condition authentication of the card 150 on successful decryption of the challenge response information.


The communication application may be configured to, upon establishing an authentication result, transmit the authentication result to the processing server 120, the authentication server 130, or other requesting system via the network 105.


The processing server 120 is a system of one or more network-enabled processing servers configured for processing transactions for an account associated with the transaction card 150. The processing server 120 is configured for selective communication with one or more user communication devices 110 (e.g., account holder mobile or other devices and merchant transaction terminals) via the network 105. The processing server 120 may be configured to store and retrieve account and transaction information in an account information database (not shown) and transaction card information in the card information database 140. The processing server 120 may receive transaction processing requests from any of the user devices 110 and is configured to use information from such requests to make determinations as to whether the requested transaction should be processed.


In some embodiments, the processing server 120 may require verification of the presence of an authorized transaction card 150 in order to process a transaction. In some such embodiments, the processing server may transmit a verification request to a user communication device 110 that is associated with the card 150 or its associated account. In other embodiments, the processing server 120 may transmit the request to a user communication device 110 (e.g., a merchant terminal) that is associated with the transaction to be processed. In either case, the verification request includes instructions for the user communication device 110 to establish an NFC communication session between the user communication device 110 and the transaction card 150 for verifying that the card 150 is in the possession of the account holder and/or in the presence of the transaction requester. In some embodiments, the verification is conducted by the user communication device 110 and the processing system 120 merely receives a response from the device 110 indicating a verification result. In some embodiments, however, the user communication device 110 may not conduct the verification and, instead, transmits to the processing server 120 challenge response information received from the transaction card 150. The processing server 120 may be configured to use the challenge response information to complete the authentication/verification of the transaction card 150. In some embodiments, however, the processing server 120 may forward the challenge response information to the authentication server 130 for completion of the authentication/verification process.


In some embodiments, the processing server 120 may generate challenge information that may be included in the verification request for submission by the user communication device 110 to the card 150. The challenge information may include card and/or transaction specific information. It may instead or in addition include an unpredictable challenge value such as a random or pseudo-random number.


The authentication server 130 may be a system of one or more network-enabled processing servers configured for selective communication with the user communication device 110 and/or the processing server 120 via the network 105. The authentication processor 130 may also be able to access the card information database 140 via the network 105 either directly or through the processing server 120. The authentication server 130 may be configured for transmitting card authentication requests to and receiving authentication responses from the user communication device 110. The authentication server 130 may be configured to generate challenge information for inclusion in an authentication request. Such challenge information may be or include card-specific information obtained from the card database 140. The challenge information may also or instead include one-time request or transaction-specific information to be used by the transaction card 150 to generate challenge response information. The authentication server 130 may be further configured to receive an authentication request response from the user communication device 110, the response including challenge response information generated by the transaction card 150. The authentication server 130 may be configured to use the challenge response information to verify that such information was generated by the expected transaction card 150.


The card database 140 may have stored therein one or more data records associated with the transaction card 150. In some embodiments, these records may include one or more private encryption keys assigned to the transaction card 150 and stored in the card memory 156. The one or more encryption keys may be accessed by the processing server 120 or the authentication server 130 as needed for decryption of card-encrypted information included in the challenge response information. The processing server 120 and/or the authentication server 130 may be configured for using the decryption keys and one or more public keys associated with the transaction card to decrypt the card-encrypted information to verify that the challenge response information was provided by the expected transaction card 150. In some embodiments, a public encryption key may be part of or included with the challenge response information.


The present invention provides a significant improvement in transaction security by providing enhanced security to the process of assuring the presence of an authenticated transaction card. By using session-specific information in combination with card-specific information to authenticate the presence of a particular account-associated card, the invention makes it difficult or impossible for an intercepting entity to use the information in a replay attack. The methods may be further enhanced by having the card itself encrypt session-specific information using private encryption keys available only from the card and a limited access card database.


It will be readily understood by those persons skilled in the art that the present invention is susceptible to broad utility and application. Many embodiments and adaptations of the present invention other than those herein described, as well as many variations, modifications and equivalent arrangements, will be apparent from or reasonably suggested by the present invention and foregoing description thereof, without departing from the substance or scope of the invention.

Claims
  • 1. A method of communicating with a transaction card having a card data processor, a near field communication (NFC) interface, and a card memory having a unique card identifier stored therein, the method comprising: establishing, by a user communication device, a first NFC session with the transaction card, wherein the transaction card comprises a microprocessor chip further comprising an NFC interface configured to communicated with the user communication device;transmitting, by the user communication device to the transaction card, a WRITE TAG command including session-specific challenge information;transmitting, by the user communication device to the transaction card, a READ TAG command, wherein the READ TAG command is transmitted within a maximum time interval from transmission of the WRITE TAG or after the maximum time interval from transmission of the WRITE TAG command;receiving, by the user communication device from the transaction card responsive to the transmission of the READ TAG command within the maximum time interval, the unique card identifier and card-specific challenge response information comprising a digital signature generated from the session-specific challenge information;receiving, by the user communication device from the transaction card responsive to the transmission of the READ TAG command after the maximum time interval, an error message; andauthenticating, by the user communication device after receipt of the card-specific challenge response information, the transaction card using the card-specific challenge response information.
  • 2. The method according to claim 1, wherein the card-specific challenge response information comprises card-encrypted information.
  • 3. The method according to claim 2, wherein the action of authenticating the transaction card includes: attempting to decrypt the card-encrypted information using at least one card-unique key associated with the unique card identifier; andresponsive to a successful decryption of the card-encrypted information, establishing a positive authentication result.
  • 4. The method according to claim 2, wherein the card-specific challenge response information further comprises a digital authentication certificate.
  • 5. The method according to claim 1, wherein the session-specific challenge information is or includes a random or pseudo-random number generated for the session.
  • 6. The method according to claim 1, wherein the session-specific challenge information is generated by and the action of authenticating is carried out by the user communication device.
  • 7. The method according to claim 1, further comprising receiving the session-specific challenge information by the user communication device from an authentication server.
  • 8. The method according to claim 7, wherein the action of authenticating the transaction card comprises: transmitting the challenge response information to the authentication server; andreceiving an authentication result from the authentication server.
  • 9. The method according to claim 1, further comprising, prior to the action of transmitting the READ TAG command: terminating, by the user communication device, the first NFC session; andestablishing, by the user communication device within a predetermined time interval after termination of the first NFC session, a second NFC session with the transaction card.
  • 10. A user communication device, comprising: a communication device data processor;a near field communication (NFC) interface in communication with the data processor and configured for communication with one or more transaction cards, wherein each transaction card comprises a microprocessor chip further comprising a transaction card NFC interface configured to communicated with the user communication device; anda communication device memory accessible by the data processor and containing a communication application with instructions to be carried out by the data processor, the communication application being configured to: establish a first NFC session with a transaction card,transmit, to the transaction card, a WRITE TAG command including session-specific challenge information,transmit, to the transaction card, a READ TAG command, wherein the READ TAG command is transmitted within a maximum time interval or after the maximum time interval from transmission of the WRITE TAG command,receive, from the transaction card responsive to the transmission of the READ TAG command within a maximum time interval, a unique card identifier and, card-specific challenge response information comprising a digital signature generated by the transaction card from the session-specific challenge information,receive, from the transaction card responsive to the transmission of the READ TAG command after the maximum time interval, an error message, andauthenticate, after receipt of the challenge response information, the transaction card using the card-specific challenge response information.
  • 11. The user communication device according to claim 10, wherein the card-specific challenge response information comprises card-encrypted information and the communication application is configured to, as part of the action to authenticate: attempt to decrypt the card-encrypted information using at least one card-unique key associated with the transaction card, andresponsive to a successful decryption of the card-encrypted information, establish a positive authentication result.
  • 12. The user communication device according to claim 10, wherein the communication application is further configured to generate a random or pseudo-random number for inclusion in the session-specific challenge information.
  • 13. The user communication device according to claim 10, further comprising: a network communication interface in communication with the communication device data processor and configured for selective communication with an authentication server via a network,wherein the communication application is further configured to receive the session-specific challenge information from the authentication server.
  • 14. The user communication device according to claim 13, wherein the communication application is further configured to, as part of the action to authenticate: transmit the challenge response information to the authentication server; andreceive an authentication result from the authentication server.
  • 15. The user communication device according to claim 10, wherein the communication application is further configured to determine a time interval between the action of transmitting the READ TAG command and receiving the card-specific challenge response information, andcarry out the action of authenticating the transaction card only if the time interval is less than a predetermined maximum communication interval.
  • 16. The user communication device according to claim 10, wherein the communication application is further configured to, prior to the action to transmit the READ TAG command: terminate the first NFC session; andestablish a second NFC session with the transaction card.
  • 17. The user communication device according to claim 16, wherein the action to establish the second NFC session is taken within a predetermined time interval after the action to terminate the first NFC session.
  • 18. A transaction card, comprising: a card microprocessor;a near field communication (NFC) interface;and a card memory having a card identifier, at least one card-unique encryption key, and one or more applets stored therein, the one or more applets including instructions for the card microprocessor to: receive, from a user communication device via the NFC interface, a WRITE TAG command including session-specific challenge information,generate a digital signature using the session-specific challenge information, wherein the digital signature is or includes a cryptogram encrypted using at least a portion of the challenge information and the at least one card-unique encryption key,receive, from the user communication device via the NFC interface, a READ TAG command, wherein the READ TAG command is received within a maximum time interval from the transmission of the WRITE TAG command or after the maximum time interval from the WRITE TAG command,transmit, to the user communication device responsive to receiving the READ TAG command within the maximum time interval, the digital signature, andtransmit, to the user communication device responsive to receiving the READ TAG command after the maximum time interval, an error message.
  • 19. The transaction card according to claim 18, wherein the card memory has at least one public key certificate stored therein and the one or more applets include instructions for the card microprocessor to transmit the at least one public key certificate with the card identifier and the digital signature.
  • 20. The transaction card according to claim 18, wherein the card-unique encryption key is associated with an account associated with the transaction card.
US Referenced Citations (573)
Number Name Date Kind
4683553 Mollier Jul 1987 A
4827113 Rikuna May 1989 A
4910773 Hazard et al. Mar 1990 A
5036461 Elliott et al. Jul 1991 A
5363448 Koopman, Jr. et al. Nov 1994 A
5377270 Koopman, Jr. et al. Dec 1994 A
5533126 Hazard Jul 1996 A
5537314 Kanter Jul 1996 A
5592553 Guski et al. Jan 1997 A
5616901 Crandall Apr 1997 A
5666415 Kaufman Sep 1997 A
5764789 Pare, Jr. et al. Jun 1998 A
5768373 Lohstroh et al. Jun 1998 A
5778072 Samar Jul 1998 A
5796827 Coppersmith et al. Aug 1998 A
5832090 Raspotnik Nov 1998 A
5883810 Franklin et al. Mar 1999 A
5901874 Deters May 1999 A
5929413 Gardner Jul 1999 A
5960411 Hartman et al. Sep 1999 A
6021203 Douceur et al. Feb 2000 A
6049328 Vanderheiden Apr 2000 A
6058373 Blinn et al. May 2000 A
6061666 Do et al. May 2000 A
6105013 Curry et al. Aug 2000 A
6199114 White et al. Mar 2001 B1
6199762 Hohle Mar 2001 B1
6216227 Goldstein et al. Apr 2001 B1
6227447 Campisano May 2001 B1
6282522 Davis et al. Aug 2001 B1
6324271 Sawyer et al. Nov 2001 B1
6342844 Rozin Jan 2002 B1
6367011 Lee et al. Apr 2002 B1
6402028 Graham, Jr. et al. Jun 2002 B1
6438550 Doyle et al. Aug 2002 B1
6501847 Helot et al. Dec 2002 B2
6631197 Taenzer Oct 2003 B1
6641050 Kelley et al. Nov 2003 B2
6655585 Shinn Dec 2003 B2
6662020 Aaro et al. Dec 2003 B1
6721706 Strubbe et al. Apr 2004 B1
6731778 Oda et al. May 2004 B1
6779115 Naim Aug 2004 B1
6792533 Jablon Sep 2004 B2
6829711 Kwok et al. Dec 2004 B1
6834271 Hodgson et al. Dec 2004 B1
6834795 Rasmussen et al. Dec 2004 B1
6852031 Rowe Feb 2005 B1
6865547 Brake, Jr. et al. Mar 2005 B1
6873260 Lancos et al. Mar 2005 B2
6877656 Jaros et al. Apr 2005 B1
6889198 Kawan May 2005 B2
6905411 Nguyen et al. Jun 2005 B2
6910627 Simpson-Young et al. Jun 2005 B1
6971031 Haala Nov 2005 B2
6990588 Yasukura Jan 2006 B1
7006986 Sines et al. Feb 2006 B1
7085931 Smith et al. Aug 2006 B1
7127605 Montgomery et al. Oct 2006 B1
7128274 Kelley et al. Oct 2006 B2
7140550 Ramachandran Nov 2006 B2
7152045 Hoffman Dec 2006 B2
7165727 de Jong Jan 2007 B2
7175076 Block et al. Feb 2007 B1
7202773 Oba et al. Apr 2007 B1
7206806 Pineau Apr 2007 B2
7232073 de Jong Jun 2007 B1
7246752 Brown Jul 2007 B2
7254569 Goodman et al. Aug 2007 B2
7263507 Brake, Jr. et al. Aug 2007 B1
7270276 Vayssiere Sep 2007 B2
7278025 Saito et al. Oct 2007 B2
7287692 Patel et al. Oct 2007 B1
7290709 Tsai et al. Nov 2007 B2
7306143 Bonneau, Jr. et al. Dec 2007 B2
7319986 Praisner et al. Jan 2008 B2
7325132 Takayama et al. Jan 2008 B2
7373515 Owen et al. May 2008 B2
7374099 de Jong May 2008 B2
7375616 Rowse et al. May 2008 B2
7380710 Brown Jun 2008 B2
7424977 Smets et al. Sep 2008 B2
7453439 Kushler et al. Nov 2008 B1
7472829 Brown Jan 2009 B2
7487357 Smith et al. Feb 2009 B2
7568631 Gibbs et al. Aug 2009 B2
7584153 Brown et al. Sep 2009 B2
7597250 Finn Oct 2009 B2
7628322 Holtmanns et al. Dec 2009 B2
7652578 Braun et al. Jan 2010 B2
7689832 Talmor et al. Mar 2010 B2
7703142 Wilson et al. Apr 2010 B1
7748609 Sachdeva et al. Jul 2010 B2
7748617 Gray Jul 2010 B2
7748636 Finn Jul 2010 B2
7762457 Bonalle et al. Jul 2010 B2
7789302 Tame Sep 2010 B2
7793851 Mullen Sep 2010 B2
7796013 Murakami et al. Sep 2010 B2
7801799 Brake, Jr. et al. Sep 2010 B1
7801829 Gray et al. Sep 2010 B2
7805755 Brown et al. Sep 2010 B2
7809643 Phillips et al. Oct 2010 B2
7827115 Weller et al. Nov 2010 B2
7828214 Narendra et al. Nov 2010 B2
7848746 Juels Dec 2010 B2
7882553 Tuliani Feb 2011 B2
7900048 Andersson Mar 2011 B2
7908216 Davis et al. Mar 2011 B1
7922082 Muscato Apr 2011 B2
7933589 Mamdani et al. Apr 2011 B1
7949559 Freiberg May 2011 B2
7954716 Narendra et al. Jun 2011 B2
7954723 Charrat Jun 2011 B2
7962369 Rosenberg Jun 2011 B2
7993197 Mamdani et al. Aug 2011 B2
8005426 Huomo et al. Aug 2011 B2
8010405 Bortolin et al. Aug 2011 B1
RE42762 Shin Sep 2011 E
8041954 Plesman Oct 2011 B2
8060012 Sklovsky et al. Nov 2011 B2
8074877 Mullen et al. Dec 2011 B2
8082450 Frey et al. Dec 2011 B2
8095113 Kean et al. Jan 2012 B2
8099332 Lemay et al. Jan 2012 B2
8103249 Markison Jan 2012 B2
8108687 Ellis et al. Jan 2012 B2
8127143 Abdallah et al. Feb 2012 B2
8135648 Oram et al. Mar 2012 B2
8140010 Symons et al. Mar 2012 B2
8141136 Lee et al. Mar 2012 B2
8150321 Winter et al. Apr 2012 B2
8150767 Wankmueller Apr 2012 B2
8186602 Itay et al. May 2012 B2
8196131 von Behren et al. Jun 2012 B1
8215563 Levy et al. Jul 2012 B2
8224753 Atef et al. Jul 2012 B2
8232879 Davis Jul 2012 B2
8233841 Griffin et al. Jul 2012 B2
8245292 Buer Aug 2012 B2
8249654 Zhu Aug 2012 B1
8266451 Leydier et al. Sep 2012 B2
8285329 Zhu Oct 2012 B1
8302872 Mullen Nov 2012 B2
8312519 Bailey et al. Nov 2012 B1
8316237 Felsher et al. Nov 2012 B1
8332272 Fisher Dec 2012 B2
8365988 Medina, III et al. Feb 2013 B1
8369960 Tran et al. Feb 2013 B2
8371501 Hopkins Feb 2013 B1
8381307 Cimino Feb 2013 B2
8391719 Alameh et al. Mar 2013 B2
8417231 Sanding et al. Apr 2013 B2
8439271 Smets et al. May 2013 B2
8475367 Yuen et al. Jul 2013 B1
8489112 Roeding et al. Jul 2013 B2
8511542 Pan Aug 2013 B2
8559872 Butler Oct 2013 B2
8566916 Vernon et al. Oct 2013 B1
8567670 Stanfield et al. Oct 2013 B2
8572386 Takekawa et al. Oct 2013 B2
8577810 Dalit et al. Nov 2013 B1
8583454 Beraja et al. Nov 2013 B2
8589335 Smith et al. Nov 2013 B2
8594730 Bona et al. Nov 2013 B2
8615468 Varadarajan Dec 2013 B2
8620218 Awad Dec 2013 B2
8667285 Coulier et al. Mar 2014 B2
8723941 Shirbabadi et al. May 2014 B1
8726405 Bailey et al. May 2014 B1
8740073 Vijayshankar et al. Jun 2014 B2
8750514 Gallo et al. Jun 2014 B2
8752189 De Jong Jun 2014 B2
8794509 Bishop et al. Aug 2014 B2
8799668 Cheng Aug 2014 B2
8806592 Ganesan Aug 2014 B2
8807440 Von Behren et al. Aug 2014 B1
8811892 Khan et al. Aug 2014 B2
8814039 Bishop et al. Aug 2014 B2
8814052 Bona et al. Aug 2014 B2
8818867 Baldwin et al. Aug 2014 B2
8831509 Moosavi et al. Sep 2014 B2
8850538 Vernon et al. Sep 2014 B1
8861733 Benteo et al. Oct 2014 B2
8880027 Darringer Nov 2014 B1
8888002 Chesney et al. Nov 2014 B2
8898088 Springer et al. Nov 2014 B2
8934837 Zhu et al. Jan 2015 B2
8977569 Rao Mar 2015 B2
8994498 Agrafioti et al. Mar 2015 B2
9004365 Bona et al. Apr 2015 B2
9020423 Naniyat et al. Apr 2015 B2
9038894 Khalid May 2015 B2
9042814 Royston et al. May 2015 B2
9047531 Showering et al. Jun 2015 B2
9069976 Toole et al. Jun 2015 B2
9077769 Krzeminski et al. Jul 2015 B2
9081948 Magne Jul 2015 B2
9104853 Venkataramani et al. Aug 2015 B2
9118663 Bailey et al. Aug 2015 B1
9122964 Krawczewicz Sep 2015 B2
9129280 Bona et al. Sep 2015 B2
9152832 Royston et al. Oct 2015 B2
9203800 Izu et al. Dec 2015 B2
9209867 Royston Dec 2015 B2
9251330 Boivie et al. Feb 2016 B2
9251518 Levin et al. Feb 2016 B2
9258715 Borghei Feb 2016 B2
9270337 Zhu et al. Feb 2016 B2
9306626 Hall et al. Apr 2016 B2
9306942 Bailey et al. Apr 2016 B1
9324066 Archer et al. Apr 2016 B2
9324067 Van Os et al. Apr 2016 B2
9332587 Salahshoor May 2016 B2
9338622 Bjontegard May 2016 B2
9373141 Shakkarwar Jun 2016 B1
9379841 Fine et al. Jun 2016 B2
9385789 Van Bosch et al. Jul 2016 B1
9413430 Royston et al. Aug 2016 B2
9413768 Gregg et al. Aug 2016 B1
9420496 Indurkar Aug 2016 B1
9426132 Alikhani Aug 2016 B1
9432339 Bowness Aug 2016 B1
9455968 Machani et al. Sep 2016 B1
9467203 Yeh Oct 2016 B2
9473509 Arsanjani et al. Oct 2016 B2
9491626 Sharma et al. Nov 2016 B2
9553637 Yang et al. Jan 2017 B2
9619952 Zhao et al. Apr 2017 B1
9635000 Muftic Apr 2017 B1
9665858 Kumar May 2017 B1
9674705 Rose et al. Jun 2017 B2
9679286 Colnot et al. Jun 2017 B2
9680942 Dimmick Jun 2017 B2
9710804 Zhou et al. Jul 2017 B2
9740342 Paulsen et al. Aug 2017 B2
9740988 Levin et al. Aug 2017 B1
9763097 Robinson et al. Sep 2017 B2
9767329 Forster Sep 2017 B2
9769662 Queru Sep 2017 B1
9773151 Mil'shtein et al. Sep 2017 B2
9780953 Gaddam et al. Oct 2017 B2
9891823 Feng et al. Feb 2018 B2
9940571 Herrington Apr 2018 B1
9953323 Candelore et al. Apr 2018 B2
9961194 Wiechman et al. May 2018 B1
9965756 Davis et al. May 2018 B2
9965911 Wishne May 2018 B2
9978058 Wurmfeld et al. May 2018 B2
10031707 Hamakawa Jul 2018 B2
10043164 Dogin et al. Aug 2018 B2
10075437 Costigan et al. Sep 2018 B1
10129648 Hernandez et al. Nov 2018 B1
10133979 Eidam et al. Nov 2018 B1
10217105 Sangi et al. Feb 2019 B1
10749885 Hoorvitch Aug 2020 B1
10909525 Dhodapkar Feb 2021 B1
11361174 Robshaw Jun 2022 B1
20010010723 Pinkas Aug 2001 A1
20010029485 Brody et al. Oct 2001 A1
20010034702 Mockett et al. Oct 2001 A1
20010054003 Chien et al. Dec 2001 A1
20020078345 Sandhu et al. Jun 2002 A1
20020093530 Krothapalli et al. Jul 2002 A1
20020100808 Norwood et al. Aug 2002 A1
20020120583 Keresman, III et al. Aug 2002 A1
20020152116 Yan et al. Oct 2002 A1
20020153424 Li Oct 2002 A1
20020165827 Gien et al. Nov 2002 A1
20030023554 Yap et al. Jan 2003 A1
20030034873 Chase et al. Feb 2003 A1
20030055727 Walker et al. Mar 2003 A1
20030078882 Sukeda et al. Apr 2003 A1
20030167350 Davis et al. Sep 2003 A1
20030208449 Diao Nov 2003 A1
20040015958 Veil et al. Jan 2004 A1
20040039919 Takayama et al. Feb 2004 A1
20040127256 Goldthwaite et al. Jul 2004 A1
20040215674 Odinak et al. Oct 2004 A1
20040230799 Davis Nov 2004 A1
20050044367 Gasparini et al. Feb 2005 A1
20050075985 Cartmell Apr 2005 A1
20050081038 Arditti Modiano et al. Apr 2005 A1
20050138387 Lam et al. Jun 2005 A1
20050156026 Ghosh et al. Jul 2005 A1
20050160049 Lundholm Jul 2005 A1
20050195975 Kawakita Sep 2005 A1
20050225427 Bell Oct 2005 A1
20050247797 Ramachandran Nov 2005 A1
20060006230 Bear et al. Jan 2006 A1
20060040726 Szrek et al. Feb 2006 A1
20060041402 Baker Feb 2006 A1
20060044153 Dawidowsky Mar 2006 A1
20060047954 Sachdeva et al. Mar 2006 A1
20060085848 Aissi et al. Apr 2006 A1
20060136334 Atkinson et al. Jun 2006 A1
20060173985 Moore Aug 2006 A1
20060174331 Schuetz Aug 2006 A1
20060242698 Inskeep et al. Oct 2006 A1
20060280338 Rabb Dec 2006 A1
20070033642 Ganesan et al. Feb 2007 A1
20070055630 Gauthier et al. Mar 2007 A1
20070061266 Moore et al. Mar 2007 A1
20070061487 Moore et al. Mar 2007 A1
20070116292 Kurita et al. May 2007 A1
20070118745 Buer May 2007 A1
20070123305 Chen et al. May 2007 A1
20070197261 Humbel Aug 2007 A1
20070224969 Rao Sep 2007 A1
20070241182 Buer Oct 2007 A1
20070256134 Lehtonen et al. Nov 2007 A1
20070258594 Sandhu et al. Nov 2007 A1
20070278291 Rans et al. Dec 2007 A1
20080008315 Fontana et al. Jan 2008 A1
20080011831 Bonalle et al. Jan 2008 A1
20080014867 Finn Jan 2008 A1
20080035738 Mullen Feb 2008 A1
20080071681 Khalid Mar 2008 A1
20080072303 Syed Mar 2008 A1
20080086767 Kulkarni et al. Apr 2008 A1
20080103968 Bies et al. May 2008 A1
20080109309 Landau et al. May 2008 A1
20080110983 Ashfield May 2008 A1
20080120711 Dispensa May 2008 A1
20080156873 Wilhelm et al. Jul 2008 A1
20080162312 Sklovsky et al. Jul 2008 A1
20080164308 Aaron et al. Jul 2008 A1
20080207307 Cunningham, II et al. Aug 2008 A1
20080209543 Aaron Aug 2008 A1
20080223918 Williams et al. Sep 2008 A1
20080285746 Landrock et al. Nov 2008 A1
20080308641 Finn Dec 2008 A1
20090037275 Pollio Feb 2009 A1
20090048026 French Feb 2009 A1
20090132417 Scipioni et al. May 2009 A1
20090143104 Loh et al. Jun 2009 A1
20090171682 Dixon et al. Jul 2009 A1
20090210308 Toomer et al. Aug 2009 A1
20090235339 Mennes et al. Sep 2009 A1
20090249077 Gargaro et al. Oct 2009 A1
20090282264 Amiel et al. Nov 2009 A1
20100023449 Skowronek et al. Jan 2010 A1
20100023455 Dispensa et al. Jan 2010 A1
20100029202 Jolivet et al. Feb 2010 A1
20100033310 Narendra et al. Feb 2010 A1
20100036769 Winters et al. Feb 2010 A1
20100078471 Lin et al. Apr 2010 A1
20100082491 Rosenblatt et al. Apr 2010 A1
20100094754 Bertran et al. Apr 2010 A1
20100095130 Bertran et al. Apr 2010 A1
20100100480 Altman et al. Apr 2010 A1
20100114731 Kingston et al. May 2010 A1
20100192230 Steeves et al. Jul 2010 A1
20100207742 Buhot et al. Aug 2010 A1
20100211797 Westerveld et al. Aug 2010 A1
20100240413 He et al. Sep 2010 A1
20100257357 McClain Oct 2010 A1
20100312634 Cervenka Dec 2010 A1
20100312635 Cervenka Dec 2010 A1
20110028160 Roeding et al. Feb 2011 A1
20110035604 Habraken Feb 2011 A1
20110060631 Grossman et al. Mar 2011 A1
20110068170 Lehman Mar 2011 A1
20110084132 Tofighbakhsh Apr 2011 A1
20110101093 Ehrensvard May 2011 A1
20110113245 Varadrajan May 2011 A1
20110125638 Davis et al. May 2011 A1
20110131415 Schneider Jun 2011 A1
20110134044 Carapelli Jun 2011 A1
20110153437 Archer et al. Jun 2011 A1
20110153496 Royyuru Jun 2011 A1
20110208658 Makhotin Aug 2011 A1
20110208965 Machani Aug 2011 A1
20110211219 Bradley Sep 2011 A1
20110218911 Spodak Sep 2011 A1
20110238564 Lim et al. Sep 2011 A1
20110246780 Yeap et al. Oct 2011 A1
20110258452 Coulier et al. Oct 2011 A1
20110280406 Ma et al. Nov 2011 A1
20110282785 Chin Nov 2011 A1
20110294418 Chen Dec 2011 A1
20110312271 Ma et al. Dec 2011 A1
20120024947 Naelon Feb 2012 A1
20120030047 Fuentes et al. Feb 2012 A1
20120030121 Grellier Feb 2012 A1
20120047071 Mullen et al. Feb 2012 A1
20120077432 Rose et al. Mar 2012 A1
20120079281 Lowenstein et al. Mar 2012 A1
20120109735 Krawczewicz et al. May 2012 A1
20120109764 Martin et al. May 2012 A1
20120143754 Patel Jun 2012 A1
20120150737 Rottink Jun 2012 A1
20120178366 Levy et al. Jul 2012 A1
20120196583 Kindo Aug 2012 A1
20120207305 Gallo et al. Aug 2012 A1
20120209773 Ranganathan Aug 2012 A1
20120220221 Moosavi et al. Aug 2012 A1
20120238206 Singh et al. Sep 2012 A1
20120239560 Pourfallah et al. Sep 2012 A1
20120252350 Steinmetz et al. Oct 2012 A1
20120254394 Barras Oct 2012 A1
20120271380 Roberts Oct 2012 A1
20120284194 Liu et al. Nov 2012 A1
20120290472 Mullen et al. Nov 2012 A1
20120296818 Nuzzi et al. Nov 2012 A1
20120316992 Oborne Dec 2012 A1
20120317035 Royyuru et al. Dec 2012 A1
20120317628 Yeager Dec 2012 A1
20130005245 Royston Jan 2013 A1
20130008956 Ashfield Jan 2013 A1
20130026229 Jarman et al. Jan 2013 A1
20130048713 Pan Feb 2013 A1
20130054474 Yeager Feb 2013 A1
20130065564 Conner et al. Mar 2013 A1
20130080228 Fisher Mar 2013 A1
20130080229 Fisher Mar 2013 A1
20130099587 Lou Apr 2013 A1
20130104251 Moore et al. Apr 2013 A1
20130106576 Hinman et al. May 2013 A1
20130119130 Braams May 2013 A1
20130130614 Busch-Sorensen May 2013 A1
20130144793 Royston Jun 2013 A1
20130171929 Adams et al. Jul 2013 A1
20130179351 Wallner Jul 2013 A1
20130185772 Jaudon et al. Jul 2013 A1
20130191279 Calman et al. Jul 2013 A1
20130196594 Moosavi Aug 2013 A1
20130196595 Byrne et al. Aug 2013 A1
20130200999 Spodak et al. Aug 2013 A1
20130216108 Hwang et al. Aug 2013 A1
20130226791 Springer et al. Aug 2013 A1
20130226796 Jiang et al. Aug 2013 A1
20130232082 Krawczewicz et al. Sep 2013 A1
20130238894 Ferg et al. Sep 2013 A1
20130268687 Schrecker Oct 2013 A1
20130282360 Shimota et al. Oct 2013 A1
20130303085 Boucher et al. Nov 2013 A1
20130304651 Smith Nov 2013 A1
20130312082 Izu et al. Nov 2013 A1
20130314334 Leica et al. Nov 2013 A1
20130314593 Reznik et al. Nov 2013 A1
20130344804 Chen et al. Dec 2013 A1
20130344857 Berionne et al. Dec 2013 A1
20140002238 Taveau et al. Jan 2014 A1
20140019352 Shrivastava Jan 2014 A1
20140027506 Heo et al. Jan 2014 A1
20140032409 Rosano Jan 2014 A1
20140032410 Georgiev et al. Jan 2014 A1
20140040120 Cho et al. Feb 2014 A1
20140040139 Brudnicki et al. Feb 2014 A1
20140040147 Varadarakan et al. Feb 2014 A1
20140047235 Lessiak et al. Feb 2014 A1
20140067690 Pitroda et al. Mar 2014 A1
20140074637 Hammad Mar 2014 A1
20140074655 Lim et al. Mar 2014 A1
20140081720 Wu Mar 2014 A1
20140138435 Khalid May 2014 A1
20140141717 Hsiao et al. May 2014 A1
20140171034 Aleksin et al. Jun 2014 A1
20140171039 Bjontegard Jun 2014 A1
20140172700 Teuwen et al. Jun 2014 A1
20140180851 Fisher Jun 2014 A1
20140208112 McDonald et al. Jul 2014 A1
20140214674 Narula Jul 2014 A1
20140220888 Shimshoni Aug 2014 A1
20140229375 Zaytzsev et al. Aug 2014 A1
20140245391 Adenuga Aug 2014 A1
20140256251 Caceres et al. Sep 2014 A1
20140258099 Rosano Sep 2014 A1
20140258113 Gauthier et al. Sep 2014 A1
20140258125 Gerber et al. Sep 2014 A1
20140274179 Zhu et al. Sep 2014 A1
20140279479 Maniar et al. Sep 2014 A1
20140337235 Van Heerden et al. Nov 2014 A1
20140339315 Ko Nov 2014 A1
20140346860 Aubry et al. Nov 2014 A1
20140365780 Movassaghi Dec 2014 A1
20140379361 Mahadkar et al. Dec 2014 A1
20150012444 Brown et al. Jan 2015 A1
20150032635 Guise Jan 2015 A1
20150071486 Rhoads et al. Mar 2015 A1
20150088757 Zhou et al. Mar 2015 A1
20150089586 Ballesteros Mar 2015 A1
20150134452 Williams May 2015 A1
20150140960 Powell et al. May 2015 A1
20150154595 Collinge et al. Jun 2015 A1
20150170138 Rao Jun 2015 A1
20150178724 Ngo et al. Jun 2015 A1
20150186871 Laracey Jul 2015 A1
20150205379 Mag et al. Jul 2015 A1
20150302409 Malek Oct 2015 A1
20150317626 Ran et al. Nov 2015 A1
20150332266 Friedlander et al. Nov 2015 A1
20150339474 Paz et al. Nov 2015 A1
20150341745 Deluca Nov 2015 A1
20150371234 Huang et al. Dec 2015 A1
20160012465 Sharp Jan 2016 A1
20160026997 Tsui et al. Jan 2016 A1
20160042207 Inotay et al. Feb 2016 A1
20160048913 Rausaria et al. Feb 2016 A1
20160055480 Shah Feb 2016 A1
20160057619 Lopez Feb 2016 A1
20160065370 Le Saint et al. Mar 2016 A1
20160087957 Shah et al. Mar 2016 A1
20160092696 Guglani et al. Mar 2016 A1
20160105290 Khalil Apr 2016 A1
20160148193 Kelley et al. May 2016 A1
20160232523 Venot et al. Aug 2016 A1
20160239672 Khan et al. Aug 2016 A1
20160253651 Park et al. Sep 2016 A1
20160255072 Liu Sep 2016 A1
20160267486 Mitra et al. Sep 2016 A1
20160277383 Guyomarc'h et al. Sep 2016 A1
20160277388 Lowe et al. Sep 2016 A1
20160307187 Guo et al. Oct 2016 A1
20160307189 Zarakas et al. Oct 2016 A1
20160314472 Ashfield Oct 2016 A1
20160330027 Ebrahimi Nov 2016 A1
20160335531 Mullen et al. Nov 2016 A1
20160379217 Hammad Dec 2016 A1
20170004502 Quentin et al. Jan 2017 A1
20170011395 Pillai et al. Jan 2017 A1
20170011406 Tunnell et al. Jan 2017 A1
20170017957 Radu Jan 2017 A1
20170017964 Janefalkar et al. Jan 2017 A1
20170024716 Jiam et al. Jan 2017 A1
20170039566 Schipperheijn Feb 2017 A1
20170041759 Gantert et al. Feb 2017 A1
20170068950 Kwon Mar 2017 A1
20170103388 Pillai et al. Apr 2017 A1
20170104739 Lansler et al. Apr 2017 A1
20170109509 Baghdasaryan Apr 2017 A1
20170109730 Locke et al. Apr 2017 A1
20170116447 Cimino et al. Apr 2017 A1
20170124568 Moghadam May 2017 A1
20170140379 Deck May 2017 A1
20170154328 Zarakas et al. Jun 2017 A1
20170154333 Gleeson et al. Jun 2017 A1
20170180134 King Jun 2017 A1
20170230189 Toll et al. Aug 2017 A1
20170237301 Elad et al. Aug 2017 A1
20170289127 Hendrick Oct 2017 A1
20170295013 Claes Oct 2017 A1
20170316696 Bartel Nov 2017 A1
20170317834 Smith et al. Nov 2017 A1
20170330173 Woo et al. Nov 2017 A1
20170374070 Shah et al. Dec 2017 A1
20180034507 Wobak et al. Feb 2018 A1
20180039986 Essebag et al. Feb 2018 A1
20180068316 Essebag et al. Mar 2018 A1
20180129945 Saxena et al. May 2018 A1
20180160255 Park Jun 2018 A1
20180191501 Lindemann Jul 2018 A1
20180205712 Versteeg et al. Jul 2018 A1
20180240106 Garrett et al. Aug 2018 A1
20180254909 Hancock Sep 2018 A1
20180262336 Fujiwara Sep 2018 A1
20180268132 Buer et al. Sep 2018 A1
20180270214 Caterino et al. Sep 2018 A1
20180294959 Traynor et al. Oct 2018 A1
20180300716 Carlson Oct 2018 A1
20180302396 Camenisch et al. Oct 2018 A1
20180315050 Hammad Nov 2018 A1
20180316666 Koved et al. Nov 2018 A1
20180322486 Deliwala et al. Nov 2018 A1
20180359100 Gaddam et al. Dec 2018 A1
20190014107 George Jan 2019 A1
20190019375 Foley Jan 2019 A1
20190036678 Ahmed Jan 2019 A1
20190064834 Adams Feb 2019 A1
20190238517 D'Agostino et al. Aug 2019 A1
20190385429 Pochtar Dec 2019 A1
20200092087 Hillan et al. Mar 2020 A1
Foreign Referenced Citations (49)
Number Date Country
2014200248 Jul 2014 AU
3010336 Jul 2017 CA
101192295 Jun 2008 CN
103023643 Apr 2013 CN
103417202 Dec 2013 CN
10 2005 062763 Jul 2007 DE
1 085 424 Mar 2001 EP
1 223 565 Jul 2002 EP
1 265 186 Dec 2002 EP
1 783 919 May 2007 EP
2 852 070 Jan 2009 EP
2 139 196 Dec 2009 EP
1 469 419 Feb 2012 EP
2495883 May 2013 EP
2663110 Nov 2013 EP
2667641 Nov 2013 EP
2 457 221 Aug 2009 GB
2 516 861 Feb 2015 GB
2 551 907 Jan 2018 GB
2015023450 Feb 2015 JP
101362818 Feb 2014 KR
20140063987 May 2014 KR
101508320 Apr 2015 KR
WO 0049586 Aug 2000 WO
WO 2006070189 Jul 2006 WO
WO 2008055170 May 2008 WO
WO 2009025605 Feb 2009 WO
WO 2010049252 May 2010 WO
WO 2011112158 Sep 2011 WO
WO 2012001624 Jan 2012 WO
WO 2012037690 Mar 2012 WO
2012140308 Oct 2012 WO
WO 2013039395 Mar 2013 WO
WO 2013155562 Oct 2013 WO
WO 2013192358 Dec 2013 WO
WO 2014043278 Mar 2014 WO
WO 2014170741 Oct 2014 WO
WO 2015179649 Nov 2015 WO
WO 2015183818 Dec 2015 WO
2016014784 Jan 2016 WO
WO 2016097718 Jun 2016 WO
WO 2016160816 Oct 2016 WO
WO 2016168394 Oct 2016 WO
WO 2017042375 Mar 2017 WO
WO 2017042400 Mar 2017 WO
WO 2017157859 Sep 2017 WO
WO 2017208063 Dec 2017 WO
WO 2018063809 Apr 2018 WO
WO 2018137888 Aug 2018 WO
Non-Patent Literature Citations (44)
Entry
EPCglobal Inc., EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID, dated Apr. 2015, pp. 1-152, downloaded from the Internet on Dec. 15, 2022 at URL: https://www.gs1.org/sites/default/files/docs/epc/Gen2_Protocol_Standard.pdf (Year: 2015).
NFC Forum, Inc., NFC Data Exchange Format (NDEF), dated Jun. 2006, pp. 1-25, downloaded from the Internet on Dec. 15, 2022 at URL: http://sweet.ua.pt/andre.zuquete/Aulas/IRFID/11-12/docs/NFC%20Data%20Exchange%20Format%20(NDEF).pdf (Year: 2006).
Batina, Lejla and Poll, Erik, “SmartCards and RFID,” PowerPoint Presentation for IPA Security Course, Digital Security at University of Nijmegen, Netherlands (date unknown), 75 pages.
Haykin M. and Warnar, R., “Smart Card Technology: New Methods for Computer Access Control,” Computer Science and Technology NIST Special Publication 500-157:1-60 (1988).
Lehpamer, Harvey, “Component of the RFID System,” RFID Design Principles, 2nd edition pp. 133-201 (2012).
Pourghomi, Pardis et al., “A Proposed NFC Payment Application,” International Journal of Advanced Computer Science and Applications, vol. 4, No. 8 (2013).
Author Unknown, “CardrefresherSM from American Express®,” [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://merchant-channel.americanexpress.com/merchant/en_US/cardrefresher, 2 pages.
Author Unknown, “Add Account Updater to your recurring payment tool,” [online] 2018-19 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.authorize.net/our-features/account-updater/, 5 pages.
Author Unknown, “Visa® Account Updater for Merchants,” [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://usa.visa.com/dam/VCOM/download/merchants/visa-account-updater-product-information-fact-sheet-for-merchants.pdf, 2 pages.
Author Unknown, “Manage the cards that you use with Apple Pay,” Apple Support [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://support.apple.com/en-US/HT205583, 5 pages.
Author Unknown, “Contactless Specifications for Payment Systems,” EMV Book B—Entry Point Specification [online] 2016 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.emvco.com/wp-content/uploads/2017/05/BookB_Entry_Point_Specification_v2_6_20160809023257319.pdf, 52 pages.
Author Unknown, “EMV Integrated Circuit Card Specifications for Payment Systems, Book 2, Security and Key Management,” Version 3.4, [online] 2011 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.emvco.com/wp-content/uploads/2017/05/EMV_v4.3_Book_2_Security_and_Key_Management_20120607061923900.pdf, 174 pages.
Author unknown, “NFC Guide: All You Need to Know About Near Field Communication” Square Guide [online] 2018 [retrieved on Nov. 13, 2018]. Retrieved from Internet URL: https://squareup.com/guides/nfc, 8 pages.
Profis, S., “Everything you need to know about NFC and mobile payments” CNET Directory [online], 2014 [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://www.cnet.com/how-to/how-nfc-works-and-mobile-payments/, 6 pages.
Cozma, N., “Copy data from other devices in Android 5.0 Lollipop setup” CNET Directory [online] 2014 [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://www.cnet.com/how-to/copy-data-from-other-devices-in-android-5-0-lollipop-setup/, 5 pages.
Kevin, Android Enthusiast, “How to copy text string from nfc tag” StackExchange [online] 2013 [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://android.stackexchange.com/questions/55689/how-to-copy-text-string-from-nfc-tag, 11 pages.
Author unknown, “Tap & Go Device Setup” Samsung [online] date unknown [retrieved on Mar. 25, 2019]. Retrieved from the Internet URL: https://www.samsung.com/us/switch-me/switch-to-the-galaxy-s-5/app/partial/setup-device/tap-go.html, 1 page.
Author Unknown, “Multiple encryption”, Wikipedia [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://en.wikipedia.org/wiki/Multiple_encryption, 4 pages.
Krawczyk, et al., “HMAC: Keyed-Hashing for Message Authentication”, Network Working Group RFC:2104 memo [online] 1997 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://tools.ietf.org/html/rfc2104, 12 pages.
Song, et al., “The AES-CMAC Algorithm”, Network Working Group RFC: 4493 memo [online] 2006 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://tools.ietf.org/html/rfc4493, 21 pages.
Katz, J., and Lindell, Y., “Aggregate Message Authentication Codes”, Topics in Cryptology [online] 2008 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.cs.umd.edu/˜jkatz/papers/aggregateMAC.pdf, 11 pages.
Adams, D., and Maier, A-K, “Goldbug BIG SEVEN open source crypto-messengers to be compared—: or Comprehensive Confidentiality Review & Audit of GoldBug Encrypting E-Mail-Client & Secure Instant Messenger”, Big Seven Study 2016 [online] [retrieved on Mar. 25, 2018]. Retrieved from Internet URL: https://sf.net/projects/goldbug/files/bigseven-crypto-audit.pdf, 309 pages.
Author Unknown, “Triple DES”, Wikipedia [online] 2018 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://simple.wikipedia.org/wiki/Triple_DES, 2 pages.
Song, F., and Yun, A.l, “Quantum Security of NMAC and Related Constructions—PRF domain extension against quantum attacks”, IACR Cryptology ePrint Archive [online] 2017 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://eprint.iacr.org/2017/509.pdf, 41 pages.
Saxena, N., “Lecture 10: NMAC, HMAC and Number Theory”, CS 6903 Modern Cryptography [online] 2008 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: http://isis.poly.edu/courses/cs6903/Lectures/lecture10.pdf, 8 pages.
Berg, Guy, “Fundamentals of EMV” Smart Card Alliance [online] date unknown [retrieved on Mar. 27, 2019]. Retrieved from Internet URL: https://www.securetechalliance.org/resources/media/scap13_preconference/02.pdf, 37 pages.
Pierce, Kevin, “Is the amazon echo NFC compatible,?” Amazon.com Customer Q&A [online] 2016 [retrieved on Mar. 26, 2019]. Retrieved from Internet URL: https://www.amazon.com/ask/questions/Tx1RJXYSPE6XLJD ?_encodi . . . , 2 pages.
Author Unknown, “Multi-Factor Authentication”, idaptive [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.centrify.com/products/application-services/adaptive-multi-factor-authentication/risk-based-mfa/, 10 pages.
Author Unknown, “Adaptive Authentication”, SecureAuth [online] 2019 [retrieved on Mar. 25, 2019}. Retrieved from Internet URL: https://www.secureauth.com/products/access-management/adaptive-authentication, 7 pages.
Van den Breekel, J., et al., “EMV in a nutshell”, Technical Report, 2016 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.cs.ru.nl/E.Poll/papers/EMVtechreport.pdf, 37 pages.
Author Unknown, “Autofill”, Computer Hope [online] 2018 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.computerhope.com/jargon/a/autofill.htm, 2 pages.
Author Unknown, “Fill out forms automatically”, Google Chrome Help [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://support.google.com/chrome/answer/142893?co=GENIE.Platform%3DDesktop&hl=en, 3 pages.
Author unknown, “Autofill credit cards, contacts, and passwords in Safari on Mac”, Apple Safari User Guide [online] 2019 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://support.apple.com/guide/safari/use-autofill-ibrw1103/mac, 3 pages.
Menghin, M.J., “Power Optimization Techniques for Near Field Communication Systems” 2014 Dissertation at Technical University of Graz [online]. Retrieved from Internet URL: https://diglib.tugraz.at/download.php?id=576a7b910d2d6&location=browse, 135 pages.
Mareli, M., et al., “Experimental evaluation of NFC reliability between an RFID tag and a smartphone” Conference paper (2013) IEEE Africon At Mauritius [online] [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://core.ac.uk/download/pdf/54204839.pdf, 5 pages.
Davison, A., et al., “MonoSLAM: Real-Time Single Camera Slam”, IEEE Transactions on Pattern Analysis and Machine Intelligence 29(6): 1052-1067 (2007).
Barba, R., “Sharing your location with your bank sounds creepy, but it's also useful”, Bankrate, LLC [online] 2017 [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.bankrate.com/banking/banking-app-location-sharing/, 6 pages.
Author unknown: “onetappaymentTM”, [online] Jan. 24, 2019, [retrieved on Mar. 25, 2019]. Retrieved from Internet URL: https://www.payubiz.in/onetap, 4 pages.
Vu et al., (2012). “Distinguishing users with capacitive touch communication” Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM. 10.1145/2348543.2348569.
EMVco, EMV Card Personalization Specification, version 1.0 (Jun. 2003), 81 pages.
Ullmann et al., (2012). “On-Card” User Authentication for Contactless Smart Cards based on Gesture Recognition, LNI, 223-234, 12 pages.
Faraj et al. (2008). “Investigation of Java Smart Card Technology for Multi-Task Applications” J. of Al-Anbar University for Pure Science, vol. 2: No. 1: 2008, 11 pages.
Dhamdhere (2017) “Key Benefits of a Unified Platform for Loyalty, Referral Marketing, and UGC” Annex Cloud [retrieved on Jul. 3, 2019]. Retrieved from Internet URL: https://www.annexcloude.com/blog/benefits-unified-platform/, 13 pages.
International Search Report and the Written Opinion of the International Searching Authority issued in related PCT Application No. PCT/US2022/021088 mailed Jun. 29, 2022, 12 pages.
Related Publications (1)
Number Date Country
20220311627 A1 Sep 2022 US