Secure credit card with near field communications
First Claim
1. A payment system, comprising:
- a near field communication (NFC) device;
a non-transitory memory; and
a processor that is coupled to the NFC device and the non-transitory memory, wherein the processor is configured to;
retrieve secure transaction information;
store the secure transaction information in the non-transitory memory, wherein the NFC device is configured to transmit the secure transaction information stored in the non-transitory memory; and
open a switch between the processor and the NFC device to erase the secure transaction information from the non-transitory memory in response to a transmission of the secure transaction information by the NFC device or in response to an expiration of a period of time subsequent to storing the secure transaction information in the non-transitory memory.
1 Assignment
0 Petitions
Accused Products
Abstract
A near field communication device included in a secure transaction card provides an addition and/or transitional communication link for communicating secure transaction information. The near field communication device may be selectively engaged or disengaged and, when engaged, either active or passive modes of operation of the near field communication device can be selected. In the active mode, secure transaction information is transmitted upon establishment of a communication link with a complementary near field communication device. In the passive mode, secure transaction information is transmitted upon interrogation from a complementary near field communication device. Secure transaction information is generated and stored for transmission in a memory and at least a portion of the memory is erased or nulled upon transmission or upon expiration of a selected period of time.
-
Citations
20 Claims
-
1. A payment system, comprising:
-
a near field communication (NFC) device; a non-transitory memory; and a processor that is coupled to the NFC device and the non-transitory memory, wherein the processor is configured to; retrieve secure transaction information; store the secure transaction information in the non-transitory memory, wherein the NFC device is configured to transmit the secure transaction information stored in the non-transitory memory; and open a switch between the processor and the NFC device to erase the secure transaction information from the non-transitory memory in response to a transmission of the secure transaction information by the NFC device or in response to an expiration of a period of time subsequent to storing the secure transaction information in the non-transitory memory. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for transmitting secure information, comprising:
-
retrieving, by a processing system that is coupled to a near field communication (NFC) device, secure transaction information; storing, by the processing system in a non-transitory memory, the secure transaction information; and opening, by the processing system, a switch between the processing system and the NFC device to erase the secure transaction information from the non-transitory memory in response to a transmission of the secure transaction information by the NFC device or in response to an expiration of a period of time subsequent to storing the secure transaction information in the non-transitory memory. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A security data transmission system, comprising:
-
a non-transitory memory; a processor that is coupled to the non-transitory memory, wherein the processor is configured to retrieve security data, store the security data in the non-transitory memory, and open a switch to erase the security data from the non-transitory memory in response to a transmission of the security data or in response to an expiration of a period of time subsequent to storing the security data in the non-transitory memory and prior to transmission of the security data; and a near field communication (NFC) device that is coupled to the processor and that is configured to communicate with a security subsystem, access the security data stored in the non-transitory memory, and transmit the security data to the security subsystem. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification