System and method to protect privacy of personal- identification-number entry on consumer mobile device and computing apparatus
A technology of equipment and input terminals, applied in transmission systems, calculations, security devices, etc., can solve problems such as single attack points
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] In an exemplary embodiment of the invention, systems and methods are included that display a random PIN layout on a first device and display a random PIN layout on a second device in such a way that the PIN layout and the PIN token never exist on the same device. accepts input from the card holder or account holder (PIN token). Embodiments of the present invention may be used by a merchant to authenticate a merchant's card reader device with a financial services provider, or by a customer to approve a financial transaction.
[0029] figure 1 Shown is the use of separate PIN layouts and PIN tokens. The first device 100 comprises a display 101 displaying a PIN layout 102 . The first device may be a dedicated device for displaying the PIN layout, or a card reader capable of displaying the PIN layout, or any device (including mobile devices) having an appropriate method (such as a special application) to display the PIN layout . The first device may belong to a merchant...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


