Ron W. Rogers - Suwanee GA Stephen J. Chasko - Flowery Branch GA
Assignee:
NCR Corporation - Dayton OH
International Classification:
G06K 1906
US Classification:
235492, 235380
Abstract:
A PIN device utilizes a preferably removable IC card to store and process data to provide a tamper resistant PIN entry system. The IC card is a tamper resistant module that provides four functions for the PIN device. The IC card: stores secure data for the PIN device; provides authentication for verifying that the IC card can be trusted; provides a mechanism for the loading of secure data into the PIN device; and provides a mechanism to authenticate its identity to other parties. The subject PIN entry system allows for servicing of the PIN device in the field.
Methods And Apparatus For Secure Personal Identification Number And Data Encryption
Stephen John Chasko - Flowery Branch GA David Junghans - Suwanee GA Adrian Shields - Glenrothes Fife, GB
Assignee:
NCR Corporation - Dayton OH
International Classification:
G06F 124
US Classification:
713193, 713182, 713200, 713201
Abstract:
A system and methods for implementing a low cost and simple PIN encryption device is disclosed. The PIN encryption device may be incorporated into customer transaction terminals, ATMs and PIN pads for use with POS terminals or other transaction devices. The PIN encryption device securely stores PIN encryption keys and PIN encryption algorithms that are used to encrypt user entered PINs on a cryptographic smart card. The system disclosed is a physically secure device that protects the integrity of the encryption keys and algorithms. The system also protects the cryptographic smart card from tampering, and prevents the discovery of PIN data by tapping the external interfaces of the customer transaction terminal.
Methods And Apparatus For Creating And Storing Secure Customer Receipts On Smart Cards
A system for creating, storing and retrieving secure transaction receipts. These transaction receipts may be stored on portable electronic media that can be carried by a consumer. Each transaction record contains information detailing the product or service purchased as well as a merchant ID and a customer (or other user) ID and an encrypted signature created from that data. The data can be further protected by the use of an optional user password. Examples of suitable portable storage media are personal computer diskettes, magnetic stripe cards or smart cards. The secure electronic transaction receipts may be used as substitutes for paper receipts. The portable electronic media is capable of storing a large plurality of such transaction records, thus simplifying a number of record keeping procedures, such as expense reporting and data entry for personal finance programs.
Method And Apparatus For Tracking Customer Purchasing Habits
A processor, bar code scanner, and a smart card interface at a checkout stand track customer purchase habits. The smart card includes memory storing accumulated values in each of several profit categories and a second processor for executing instructions. The first processor transfers data to and from the smart card. The smart card, while coupled to the first processor, transfers stored category values containing accumulated purchase values in each of different profit margin ranges stored to the first processor. The first processor responds to the bar code scanner to retrieve profit margin data for a purchased product carrying the bar code read by the bar code scanner. The first processor adds the retrieved profit margin data and the accumulated profit margin data transferred from the smart card to the first processor for the profit margin category that is the same as the profit margin category of the purchased product. The first processor compares the resultant sum with a predetermined value for the profit margin category of the purchased product to determine if the purchaser is to receive a reward. The first processor increments the category values by an amount in relation to the customer's purchase and profit margin information and transfers the incremented category values to the smart card.
System And Method For Securing Transactional Data Transmitted Over A Wireless Network In A Retail Store Environment
Ron W. Rogers - Suwanee GA, US Stephen J. Chasko - Flowery Branch GA, US
Assignee:
NCR Corporation - Dayton OH
International Classification:
H04K 1/00 H04L 9/00
US Classification:
705 64, 705 50, 705 51
Abstract:
A system and method secure transactional data communicated over a wireless network in a store by obfuscating bona fide transactional messages in the message traffic flow. The system includes a load balancer coupled to a store host computer and a plurality of transactional terminals coupled to the store host computer through a wireless communication network. The load balancer monitors message traffic queues and message processing at the store host computer to determine possible dead time in the bandwidth of the wireless communication network. If the dead time is greater than a threshold, a bogus request message is generated and sent to one or more terminals in the system. In response to receipt of a bogus request message, a terminal activates a bogus message generator. The bogus message generator generates transactional messages with bogus customer, account, and transactional data therein. The generated messages are transmitted to the store host computer until a bogus message timer expires or a bona fide transaction commences at the terminal where the bogus message generator has been activated.
Systems For Detecting, Collecting, Communicating, And Using Information About Environmental Conditions And Occurrences
Systems and methods are disclosed for identifying and providing warnings of tornadoes, hurricanes, earthquakes, and other environmental occurrences. Temperature, pressure, seismic activities and other environmental conditions are measured with improved granularity using sensors at multiple locations. More extensive distribution of sensors is enabled using existing networks, such as utility (e. g. , gas and electricity) meter networks. Network traffic is improved by screening information locally so that only limited information is sent for central processing. A given location, for example, may compare its own and its neighbors measurements against a profile to identify the probable existence of a tornado before sending a message to a central processing device. Upon receiving such a message and possibly other information (e. g. , other messages or weather service information), a central device may send notifications to specific facilities that an environmental occurrence may be occurring, for example, notifying specific residences in the expected path of a tornado.
System And Method For Implementing Financial Transactions Using Biometric Keyed Data
Colin Waters - Lawrenceville GA, US Stephen Chasko - Flowery Branch GA, US
Assignee:
NCR Corporation
International Classification:
G06F017/60
US Classification:
705/001000
Abstract:
A system and method provide access to a consumer's financial account without requiring a token or personal identifier. The system includes a biometric data capture device for capturing biometric data corresponding to the consumer. The biometric data is sent to a merchant payment host where it is used to generate a data storage key. Data records in an identity database are stored in the database by using keys generated from biometric data contained in the records. The biometric data contained in the records is obtained from consumers responsible for financial accounts maintained by the merchant payment host. When the merchant payment host locates a record in the database that corresponds to the key generated from the received biometric data, the host compares the received biometric data to the biometric data stored in the retrieved record. Correspondence between the two sets of data confirms the existence of a financial account for the consumer managed by the host and processing of a transaction may proceed. Security of the transaction is further enhanced by generating a digital signature from the biometric data for purposes of verifying a consumer approved transaction message.
Methods And Systems For Sending Messages Regarding An Emergency That Occurred At A Facility
Emmanuel Monnerie - Cumming CA, US Jeffrey B. Shudark - Cumming GA, US Stephen J. Chasko - Alpharetta GA, US
Assignee:
Cellnet Innovations, Inc. - Alpharetta GA
International Classification:
G08B 1/08 G08B 21/00
US Classification:
34053922, 340540
Abstract:
Systems and methods are disclosed for sending messages regarding an emergency at a facility. The messages can be sent to an emergency response service or directly to another facility through a wireless mesh network. The wireless mesh network can comprise one or more nodes that route measurement data, such as utility meter reading data. The emergency messages can be assigned a higher priority so that they travel through the wireless mesh network more quickly. A device receiving an emergency message may identify the address of the associated facility, for example, by identifying an address associated with utility service also provided at the same facility. The address can be forwarded to an emergency response service and a confirmation or other message may be sent back to the facility. A device at a facility may receive various messages from a control center, such as a weather center, over the wireless mesh network.