Secure smart card
First Claim
1. A method for providing a secure transaction, comprising the steps of:
- (a) receiving a new identification verification data by a transaction device directly from a user;
(b) storing the new identification verification data on the transaction device only, wherein the new identification verification data is not shared with another device;
(c) receiving an input of an identification verification data by the transaction device directly from the user;
(d) activating the transaction device if the inputted identification verification data matches the new identification verification data; and
(e) deactivating the transaction device when an event occurs.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for providing a secure transaction includes: receiving a new identification verification data by a transaction device directly from a user; storing the new identification verification data on the transaction device only, where the new identification verification data is not shared with another device; receiving an input of an identification verification data by the transaction device directly from the user; activating the transaction device for a predetermined period of time if the inputted identification verification data matches the new identification verification data; and deactivating the transaction device when an event occurs. The event can be the expiration of a predetermined period of time, the completion of the secure transaction, or some other event. No additional devices are needed to input or store the new identification verification data on the smart card. In this manner, if the transaction device is lost or stolen, it is useless to anyone not knowing the new identification verification data.
42 Citations
16 Claims
-
1. A method for providing a secure transaction, comprising the steps of:
-
(a) receiving a new identification verification data by a transaction device directly from a user;
(b) storing the new identification verification data on the transaction device only, wherein the new identification verification data is not shared with another device;
(c) receiving an input of an identification verification data by the transaction device directly from the user;
(d) activating the transaction device if the inputted identification verification data matches the new identification verification data; and
(e) deactivating the transaction device when an event occurs. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for providing a secure transaction, comprising the steps of:
-
(a) receiving an initial identification verification data by the transaction device directly from the user;
(b) verifying the initial identification verification data by the transaction device;
(c) receiving a new identification verification data by the transaction device directly from the user;
(d) storing the new identification verification data on the transaction device only, wherein the new identification verification data is not shared with another device;
(e) receiving an input of an identification verification data by the transaction device directly from the user;
(f) determining if the inputted identification verification data matches the new identification verification data by the transaction device;
(g) activating the transaction device if the inputted identification verification data matches the new identification verification data;
(h) starting a timer if the transaction device is activated, wherein the timer expires after a predetermined period of time; and
(i) deactivating the transaction device when the timer expires.
-
-
8. A method for providing a secure transaction, comprising the steps of:
-
(a) receiving an initial identification verification data by the transaction device directly from the user;
(b) verifying the initial identification verification data by the transaction device;
(c) receiving a new identification verification data by the transaction device directly from the user;
(d) storing the new identification verification data on the transaction device only, wherein the new identification verification data is not shared with another device;
(e) receiving an input of an identification verification data by the transaction device directly from the user;
(f) determining if the inputted identification verification data matches the new identification verification data by the transaction device;
(g) activating the transaction device if the inputted identification verification data matches the new identification verification data; and
(h) deactivating the transaction device when the secure transaction is completed.
-
-
9. A transaction device, comprising:
-
an inputting means for receiving an inputted identification verification data;
a decoder coupled to the inputting means for sensing, decoding, and verifying the inputted identification verification data; and
a processor coupled to the decoder, wherein the decoder asserts an activation signal to the processor if the identification verification data is verified, wherein the decoder de-asserts the activation signal when an event occurs. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A transaction device, comprising:
-
a plurality of capacitive keys for inputting an identification verification data, wherein each capacitive key comprises a first side and a second side;
an oscillator coupled to the first side of each capacitive key;
a decoder coupled to the second side of each capacitive key for sensing, decoding, and verifying the inputted identification verification data when the first and second sides of at least one of the capacitive keys are coupled, wherein the decoder comprises a stored identification verification data, wherein the decoder verifies the inputted identification verification data by determining that the inputted identification verification data matches the stored identification verification data;
a power source coupled to the oscillator and the decoder;
a processor coupled to the decoder, wherein the decoder asserts an activation signal to the processor if the inputted identification verification data is verified; and
a timer circuit coupled to the decoder, wherein the timer circuit is initiated when the decoder asserts the activation signal, wherein the timer circuit expires after a predetermined period of time, wherein the decoder de-asserts the activation signal to the processor when the timer circuit expires.
-
-
16. A transaction device, comprising:
-
a plurality of capacitive keys for inputting an identification verification data, wherein each capacitive key comprises a first side and a second side;
an oscillator coupled to the first side of each capacitive key;
a decoder coupled to the second side of each capacitive key for sensing, decoding, and verifying the inputted identification verification data when the first and second sides of at least one of the capacitive keys are coupled, wherein the decoder comprises a stored identification verification data, wherein the decoder verifies the inputted identification verification data by determining that the inputted identification verification data matches the stored identification verification data;
a power source coupled to the oscillator and the decoder; and
a processor coupled to the decoder, wherein the decoder asserts an activation signal to the processor if the inputted identification verification data is verified, wherein the decoder de-asserts the activation signal to the process when a secure transaction is completed.
-
Specification