INTEGRATION OF VERIFICATION TOKENS WITH MOBILE COMMUNICATION DEVICES
0 Assignments
0 Petitions
Accused Products
Abstract
Apparatuses, methods, and systems pertaining to the verification of portable consumer devices are disclosed. In one implementation, a verification token is communicatively coupled to a computer by a USB connection so as to use the computer'"'"'s networking facilities. The verification token reads identification information from a user'"'"'s portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer'"'"'s networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a device verification value to the verification token, and optionally to a payment processing network. The verification token may enter the device verification value into a CVV field of a web page appearing on the computer'"'"'s display, or may display the value to the user using the computer'"'"'s display.
80 Citations
64 Claims
-
1-49. -49. (canceled)
-
50. A device comprising:
-
a housing; a first processor disposed within the housing; a first memory unit disposed within the housing; an input-output controller coupled to the first processor; and a verification token disposed within the housing and communicatively coupled to the input-output controller, the verification token comprising a second processor separate from the first processor, a second memory unit separate from the first memory unit and storing an encryption key for encrypting or signing data sent from the verification token to a validation entity. - View Dependent Claims (51, 52, 53, 54, 55, 56, 57)
-
-
58. A method comprising:
-
receiving identification information at a verification token in a device, the device comprising (a) a housing, (h) a first processor disposed within the housing, (c) a first memory unit disposed within the housing, (d) an input-output controller coupled to the first processor, and (e) the verification token communicatively coupled to the input-output controller, the verification token comprising a second processor separate from the first processor, a second memory unit separate from the first memory unit and storing an encryption key; encrypting, the identification data using the encryption key; and transmitting, the encrypted identification data to a validation entity. - View Dependent Claims (59, 60, 61, 62, 63, 64)
-
Specification