FINGERPRINT SCANNER SECURITY DEVICE
First Claim
1. A computer-implemented method for identifying stolen payment cards using a fingerprint scanner, the method comprising:
- receiving, by a transaction processing terminal, a payment card;
scanning, by the fingerprint scanner, a surface of the payment card and capturing fingerprints disposed on the surface of the payment card;
comparing, by a processor, the captured fingerprints to one or more authorized fingerprints associated with the payment card;
based on detecting that the captured fingerprints are different than the one or more authorized fingerprints, determining whether the payment card has been reported stolen; and
based on a determination that the payment card has been reported stolen, creating and transmitting an alert of an attempted use of the payment card.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems and computer program products for identifying stolen payment cards using a fingerprint scanner are provided. Aspects include receiving, by a transaction processing terminal, a payment card and scanning, by the fingerprint scanner, a surface of the payment card and capturing fingerprints disposed on the surface of the payment card. Aspects also include comparing, by a processor, the captured fingerprints to one or more authorized fingerprints associated with the payment card. Based on detecting that the captured fingerprints are different than the one or more authorized fingerprints, aspects further include determining whether the payment card has been reported stolen. Based on a determination that the payment card has been reported stolen, aspects include creating and transmitting an alert of an attempted use of the payment card.
26 Citations
7 Claims
-
1. A computer-implemented method for identifying stolen payment cards using a fingerprint scanner, the method comprising:
-
receiving, by a transaction processing terminal, a payment card; scanning, by the fingerprint scanner, a surface of the payment card and capturing fingerprints disposed on the surface of the payment card; comparing, by a processor, the captured fingerprints to one or more authorized fingerprints associated with the payment card; based on detecting that the captured fingerprints are different than the one or more authorized fingerprints, determining whether the payment card has been reported stolen; and based on a determination that the payment card has been reported stolen, creating and transmitting an alert of an attempted use of the payment card. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification