Patents by Inventor Patrick Faith

Patrick Faith has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110191237
    Abstract: Embodiments of the present invention are directed to systems, apparatuses and methods for using a first device with an accelerometer to transfer data by making contact with a second device with an accelerometer, thereby generating interaction data that is representative of the physical contact between the mobile device and the second device. The first device may be a mobile phone. The second device may be a mobile phone or a stationary kiosk or terminal. A first device with an accelerometer physically contacts the second device. Each of the first and second devices generate interaction data (e.g., accelerometer, location, time data, etc.) representative of the physical interaction between the first and second device. A server computer determines, based on interaction data, that the first device and the second device physically contact each other. After determining that the mobile device and the second device made contact, communications may be initiated between the devices.
    Type: Application
    Filed: November 23, 2010
    Publication date: August 4, 2011
    Inventors: Patrick Faith, Mark Carlson, Ayman Hammad, Ben Rewis, Kris Koganti
  • Publication number: 20110159850
    Abstract: Methods, devices, and systems are presented for screen locking or delaying the screen locking of mobile devices, such as smart phones, based on whether the gait of the current user match that of its true, authorized owner. A user's gait can be measured using accelerometers embedded in the device. Other movements, such as where a user normally goes to work, can be measured using GPS or other positional location data and used to lock or delay locking of the screen.
    Type: Application
    Filed: November 24, 2010
    Publication date: June 30, 2011
    Inventors: Patrick Faith, Mark Carlson, Ayman Hammad
  • Publication number: 20110159857
    Abstract: Methods, devices, and systems are described for bumping a mobile device, such as a smart phone, against a fixed poster board display at a store to initiate a download of coupons, advertisements, or other benefits to the mobile device. Products can be rated by a user's up/down bump or other bump patterns. Using accelerometer-based inertial measurements, multiple users can control multiple mouse cursors on a large display with their mobile devices in order to select information to be downloaded to their mobile devices.
    Type: Application
    Filed: November 24, 2010
    Publication date: June 30, 2011
    Inventors: Patrick Faith, Mark Carlson, Ayman Hammad
  • Publication number: 20110161136
    Abstract: Methods, devices, and systems are presented for detecting where shoppers in a store stop, turn, and look from accelerometers in their own smart phones or other mobile devices. These movement events can be correlated with merchandise on their receipts as well as the movement events and merchandise on the receipts of other users so that a map of the store's wares can be generated. The map can be used to inform manufacturers where their merchandise is stocked in the store or to advertise to shoppers as they browse the store.
    Type: Application
    Filed: November 24, 2010
    Publication date: June 30, 2011
    Inventors: Patrick Faith, Mark Carlson, Ayman Hammad
  • Patent number: 7967203
    Abstract: Methods, systems, and apparatus for efficiently authenticating a document (e.g. a credit card) having a magnetic stripe are provided. The magnetic field at different points of the magnetic stripe are measured, e.g., by a checkout scanner to create a magnetic signature. Digital samples of the measurements may be transformed into coefficients of continuous basis functions, e.g., a Fourier transform. These coefficients are then compared to reference values (e.g. corresponding coefficients) to produce a measure of the authenticity of the document. The number of coefficients used can advantageously be smaller than the number of digital samples without compromising accuracy, thus using less bandwidth between a scanner and an authentication entity.
    Type: Grant
    Filed: November 21, 2008
    Date of Patent: June 28, 2011
    Assignee: Visa International Service Association
    Inventors: Xiang Fang, Patrick Faith, Craig Kato, Ayman Hammad, Krishan Prasad Koganti
  • Publication number: 20110119155
    Abstract: Apparatuses, methods, and systems pertaining to the verification of portable consumer devices for 3-D Secure Systems are disclosed. In one implementation, a verification token is coupled to a computer by a USB connection so as to use the computer's networking facilities. The verification token reads identification information from a user's portable consumer device (e.g., credit card) and sends the information to a validation entry over a communications network using the computer's networking facilities. The validation entity applies one or more validation tests to the information that it receives from the verification token. If a selected number of tests are passed, the validation entity sends a 3-D Secure datum to the verification token. The verification token may enter the 3-D Secure datum into a hidden field of a Purchase Authentication Page appearing on the computer's display.
    Type: Application
    Filed: November 4, 2010
    Publication date: May 19, 2011
    Inventors: Ayman Hammad, Patrick Faith, Krishna Prasad Koganti, Ben Rewis, Brendan Xavier Louis, Kevin Weller, Benedicto Hernandez Dominguez
  • Publication number: 20110112954
    Abstract: A system for providing real-time risk mitigation for an authorization system. The system receives authorization requests from multiple merchants (or their respective acquirers) and processes such requests. Each processed request is then forwarded to its corresponding issuer for further authorization. Each processed request includes an authorization message. The authorization message can include a risk score, a number of reason codes, and a number of condition codes. The use of the risk score, reason codes and condition codes allows issuers to make better informed decisions with respect to providing authorizations.
    Type: Application
    Filed: August 2, 2010
    Publication date: May 12, 2011
    Inventors: Belva J. Bruesewitz, Nancy Hilgers, Patrick Faith, Kevin Siegel, Xiaoli Li, Kris Koganti, Craig O'Connell
  • Publication number: 20110106659
    Abstract: A method for delivering non-financial electronic data through a secure communications channel between a payment processing network and an access device is disclosed. One embodiment of the invention is directed to a method comprising receiving, at a payment processing network, a request to establish a secure communications channel between a consumer device and the payment processing network. Upon establishing a secure communications channel with the consumer device, the payment processor network receives non-financial electronic content from a merchant at the payment processing network where the non-financial electronic content is selected at the merchant by a user associated with the consumer device. The non-financial electronic content is sent to the consumer device from the payment processing network via the secure communications channel between the consumer device and the payment processing network.
    Type: Application
    Filed: November 2, 2010
    Publication date: May 5, 2011
    Inventors: Patrick Faith, Kris Koganti, Ayman Hammad, Ben Rewis
  • Publication number: 20110106710
    Abstract: Techniques for eliminating the need for merchants and acquirers to conduct Payment Card Industry (“PCI”) security audit procedures are provided. Merchants and acquirers can eliminate the operating expenses associated with conducting audits to ensure compliance with PCI Data Security Standards (“DSS”), while at the same time ensuring that cardholders' data remains secure, thus protecting the cardholders from fraudulent transactions. System security is further enhanced through the use of per transaction audits, with the scope of the audit being directly between the Point of Sale (POS) terminal and the payment processing network. PCI DSS compliance can thus be assured on a per transaction basis, as opposed to only ensuring compliance generally for a merchant or acquirer on a periodic basis. Per transaction PCI DSS compliance is assured, while at the same time eliminating the need for merchants or acquirers to conduct compliance audits.
    Type: Application
    Filed: November 4, 2010
    Publication date: May 5, 2011
    Inventors: Judson Reed, Patrick Faith, Ben Rewis
  • Publication number: 20110093397
    Abstract: A server computer is disclosed. It comprises a processor and a computer readable medium coupled to the processor. The computer readable medium comprises code executable by the processor for implementing a method comprising: (i) receiving a request to conduct a transaction, (ii) providing a user interface to a user in response to the request, wherein the user interface includes a list of candidate identification tokens, wherein the list of candidate identification tokens includes an authentic identification token and one or more non-authentic identification tokens, wherein the authentic identification token is associated with a user account.
    Type: Application
    Filed: October 15, 2010
    Publication date: April 21, 2011
    Inventors: Mark Carlson, Patrick Faith
  • Publication number: 20110073640
    Abstract: Systems, methods and devices for making and using EMF signature enabled portable consumer devices are disclosed. EMF signature enabled portable consumer devices, such as credit cards, can include a conductive or semiconductive brittle material layer with an intentionally created random crack or fissure pattern. The intentionally created unique random crack patterns can be created by cost effective and highly scalable standardized processes. When an input signal is applied to the portable consumer device, an EMF signature based on the unique random crack pattern can be induced. The resulting EMF signature can be detected, processed and used as the basis for various encryption, security or authentication protocols.
    Type: Application
    Filed: September 30, 2010
    Publication date: March 31, 2011
    Inventors: Patrick Faith, Mark Carlson
  • Publication number: 20110066551
    Abstract: A system for providing real-time risk mitigation for an authorization system. The system receives authorization requests from multiple merchants (or their respective acquirers) and processes such requests. Each processed request is then forwarded to its corresponding issuer for further authorization. Each processed request includes an authorization message. The authorization message can include a risk score, a number of reason codes, and a number of condition codes. The use of the risk score, reason codes and condition codes allows issuers to make better informed decisions with respect to providing authorizations.
    Type: Application
    Filed: August 25, 2010
    Publication date: March 17, 2011
    Inventors: Belva J. Bruesewitz, Nancy Hilgers, Patrick Faith, Kevin Siegel, Xiaoli Li, Kris Koganti, Craig O'Connell
  • Publication number: 20110066516
    Abstract: Embodiments of the invention provide a portable consumer device configured to store dynamic authentication data in memory. The portable consumer device also includes an interface for transmitting data to and receiving power from an external device. The dynamic authentication data is read from the memory by a read-write device located on the portable consumer device. The authentication data is updated and the updated data may be written into memory using the read-write device. In some embodiments, an authentication value read from the memory may be used to generate another authentication value based on an algorithm. The portable consumer device is further configured to transmit authentication data to an external device. The process of reading, updating, generating, transmitting, and rewriting the authentication data may occur each time external power is provided to the portable consumer device via the interface.
    Type: Application
    Filed: September 1, 2010
    Publication date: March 17, 2011
    Inventors: Ayman Hammad, Patrick Faith
  • Publication number: 20110049233
    Abstract: A point of issuance cracking device for producing and recording intentionally created unique crack patterns in a brittle material layer of portable consumer devices and methods of using same for authentication are disclosed. When a conductive material is used for the brittle material layer, the electromagnetic field (EMF) signature of the intentionally created cracks can be detected, stored and compared for the purposes of the authenticating the portable consumer device.
    Type: Application
    Filed: August 11, 2010
    Publication date: March 3, 2011
    Inventors: Patrick Faith, Mark Carlson
  • Publication number: 20110047040
    Abstract: Methods and system for determining reputation information are provided. The method includes analyzing transactional and non-transactional information for an alias associated with an entity and determining reputation information for that alias. The reputation information is transferable across multiple domains. A user can request the reputation information about an entity prior to doing business with that entity. The reputation information is generated for merchants as well as users. The system can generate transaction risk score for every transaction to be conducted between two or more aliases. The system includes an alias identity and reputation validation server computer that receives inputs from various external systems and generated reputation information based on the inputs. Additionally, every individual user/merchant can manage his profile within the reputation database and enter some information manually.
    Type: Application
    Filed: July 29, 2010
    Publication date: February 24, 2011
    Inventors: Mark Carlson, Patrick Stan, Patrick Faith, Benjamin Rewis
  • Publication number: 20110046969
    Abstract: Methods for creating an alias data structure are provided. A representative method includes receiving transaction information related to a first alias associated with an entity, receiving transaction information between a first object and the entity, and associating the first object with the first alias based at least in part on the transaction information related to the first alias and transaction information between the first object and the entity. The method further includes continually monitoring transaction information related to the first object and updating the association of the first object with the first alias in response to the transaction information.
    Type: Application
    Filed: July 29, 2010
    Publication date: February 24, 2011
    Inventors: Mark Carlson, Patrick Stan, Patrick Faith, Benjamin Rewis
  • Publication number: 20110047076
    Abstract: Systems and method for generating reputation information for an alias are provided. The alias is associated with an entity. Payment transaction information related to a first alias associated with a first entity is received. The payment transaction information includes payment transactions performed by the first entity. In addition, non-payment transaction information related to the first alias is also received. The non-payment transactions include transaction between the first alias and one or more objects. The payment transaction information and the non-payment transaction information is analyzed to associate the one or more objects with the first alias. Thereafter, reputation information for the first alias is generated based at least in part on the payment transaction information and the non-payment transaction information.
    Type: Application
    Filed: July 29, 2010
    Publication date: February 24, 2011
    Inventors: Mark Carlson, Patrick Stan, Patrick Faith, Benjamin Rewis
  • Publication number: 20110004526
    Abstract: A method for verifying a portable consumer device. The method includes receiving an authorization request message associated with a transaction conducted using a portable consumer device. The portable consumer device includes a portable consumer device fingerprint. The authorization request message includes an altered portable consumer device fingerprint and an algorithm identifier. The method also includes selecting an algorithm from among a plurality of algorithms using the algorithm identifier, determining the portable consumer device fingerprint using selected algorithm and the altered portable consumer device fingerprint, determining if the portable consumer device fingerprint matches a stored portable consumer device fingerprint, and sending an authorization response message after determining if the portable consumer device fingerprint matches the stored portable consumer device fingerprint.
    Type: Application
    Filed: September 15, 2010
    Publication date: January 6, 2011
    Inventors: Ayman Hammad, Patrick Faith
  • Publication number: 20100318783
    Abstract: Systems and methods for service activation using algorithmically defined keys are disclosed. A consumer who has a relationship with a first party may wish to enroll in a service provided by a third party. The first party can maintain control of such enrollments through the use of algorithmically defined keys. The algorithmically defined keys also allow the third party service provider to verify data provided by the consumer as matching data stored by the first party. The verification provides for data synchronization without requiring the third party to have access to the first parties data systems.
    Type: Application
    Filed: June 8, 2010
    Publication date: December 16, 2010
    Inventors: Ashwin Raj, John Tullis, Mark Carlson, Patrick Faith, Shalini Mayor, Joseph Mirizzi, Lauren White, Olivier Brand, Mike Lindelsee
  • Publication number: 20100299267
    Abstract: In order to make it more difficult to obtain numbers that can be used to conduct fraudulent transactions, a portion of a real account number is encrypted. The encrypted portion of the account number is used to generate a new account number, a new expiration date, and a new verification value. This information can be determined using processor that may reside in a point of sale terminal, a smart card, or a computer operated by a user. The new account number, the new expiration date, and the new verification value can be used in a payment transaction. A server computer in a central payment processing network may determine that the new account information is not the real account information, and may subsequently generate a modified authorization request message using the real account information and may send it to an issuer for approval. The transmission of data is more secure, since real account information is not sent from the merchant to the payment processing network.
    Type: Application
    Filed: May 12, 2010
    Publication date: November 25, 2010
    Inventors: Patrick Faith, Krishna Prasad Koganti