Transaction Verification on RFID Enabled Payment and Transaction Instruments
a technology of transaction verification and transaction instruments, applied in the field of transaction verification on rfid enabled payment and transaction instruments, can solve the problems of easy misleading by malicious users, inability for users to verify (in real time) transaction details, and small amount frauds that are easy to miss on statements, so as to reduce the vulnerability of spying
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046]In this disclosure, we address four primary issues: user-to-tag authentication, transaction verification, reader revocation and expiration, and secure pairing of RFID tags.
User-to-Tag Authentication
[0047]In many use cases of RFID-based electronic payment and identification documents, authentication of the user to the tag 12 before disclosing any information is necessary to prevent leaks of valuable or private information. Current systems require trust in readers 10 for the purpose of authentication. For example, users must enter PIN-s into ATMs or Point-of-Sale (POS) terminals to authenticate themselves to the RFID tag 12 embedded into their ATM or credit card. However, this leaves users vulnerable to attacks, since secret PINs are being disclosed to third party readers 10, that are easy to hack and modify.
Transaction Verification
[0048]RFID tags 12 are commonly used as payment and transaction instruments (e.g., credit, debit, ATM and voting cards). In such settings, a maliciou...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


