Computer-based systems utilizing cards with cellular capabilities and methods of use thereof

ABSTRACT

In various some embodiments a cellular card includes at least one microprocessor. The cellular card is equipped with multiple devices and configured with multiple functionalities to deter use of the cellular card in unsecure or fraudulent transactions. In various embodiments, the cellular card overcomes drawbacks often associated with cards containing batteries such as battery overheating, battery short life time, battery underperformance in extreme temperatures, and other types of drawbacks associated with batteries contained in cards.

BACKGROUND OF TECHNOLOGY

Smart cards can connect to computing devices with direct physicalcontact or with a remote contactless radio frequency interface. Smartcards can store data and transmit such data to computing devices. Somesmart cards include static data that can be used to complete aninteraction with a computing device. Such smart cards can be tamperedwith when a third-party uses the static data to complete interactionswith computing devices unbeknown to a legitimate user of a smart card.

SUMMARY OF DESCRIBED SUBJECT MATTER

In some embodiments, the present disclosure provides a technicallyimproved system comprising: a cellular card comprising: a processor; atleast one antenna; a non-transient memory storing instructions which,when executed by the processor, cause the processor to: power up thecellular card upon receiving a power from an external power sourcehoused within a computing device during at least one interaction betweenthe cellular card and the computing device; where the card lacks aninternal power source; and when the cellular card is powered up, theprocessor is further configured to: establish, via the antenna, a firstwireless communication with at least one cellular network towerassociated with a mobile network carrier during the at least oneinteraction between the card and the computing device; provide, with thefirst wireless communication, card identifying data to the mobilenetwork carrier to register the cellular card with a user mobile accountof a user who is associated with the cellular card so to transform thecellular card into a user-associated mobile card device; receive, fromthe mobile network carrier, user mobile account data that comprises auser-associated private key; transmit the user mobile data to a cardissuing entity computing device of a card issuing entity that issued thecellular card to the user so as to associate the user mobile accountwith user card account of the user corresponding to the card based atleast in part on the user-associated private key; and cause to share theuser mobile account data of the user mobile account and user cardaccount data of the user card account between the mobile network carrierand the card issuing entity.

In some embodiments, the present disclosure provides a technicallyimproved method comprising: powering up a cellular card by applying apower from an external power source housed within a computing deviceduring at least one interaction between the cellular card and thecomputing device; where the cellular card lacks an internal powersource; where the cellular card comprises at least one antenna, aprocessor, and a non-transient memory; and when the cellular card ispowered up: establishing, by the processor, via the antenna, a firstwireless communication with at least one cellular network towerassociated with a mobile network carrier during the at least oneinteraction between the cellular card and the computing device;providing, by the processor, with the first wireless communication, cardidentifying data to the mobile network carrier to register the cellularcard with a user mobile account of a user who is associated with thecellular card so to transform the card into a user-associated mobilecard device; receiving, by the processor, from the mobile networkcarrier, user mobile account data that comprises a user-associatedprivate key; transmitting, by the processor, the user mobile data to acard issuing entity computing device of a card issuing entity thatissued the card to the user so to associate the user mobile account withuser card account of the user corresponding to the cellular card basedat least in part on the user-associated private key; and causing toshare, by the processor, the user mobile account data of the user mobileaccount and user card account data of the user card account between themobile network carrier and the card issuing entity.

In some embodiments, the present disclosure provides a technicallyimproved computer-based apparatus that includes at least the followingcomponents of a computer-based dynamic cellular card. The dynamiccellular card can perform an interaction with a computing device using afirst temporary identification card number. The dynamic cellular card iswithout an internal power source and is powered up by an external powersource housed within the computing device. The dynamic cellular card canreceive a new identification card number from a server in communicationwith the computing device. The dynamic cellular card can show the secondtemporary identification card number on a display, replacing the firsttemporary identification card number. The second temporaryidentification card number can remain shown on the display after theexternal power is discontinued. The dynamic cellular card can be usedwith the second temporary identification card number in a subsequentinteraction with another computing device.

In some embodiments, the present disclosure provides a technicallyimproved computer-based apparatus that includes at least the followingcomputer-based dynamic cellular card. A dynamic cellular cardcomprising: a processor; a display; and a non-transitory memory storinginstructions; where the dynamic cellular card is configured to power upupon receiving a power from an external power source housed within acomputing device; where the dynamic cellular card is without an internalpower source; where the instructions, when executed by the processor,cause the processor to: cause to transmit a first temporary cardidentification number associated with the dynamic cellular card to thecomputing device; receive at least one encrypted card identificationnumber from at least one server in communication with the computingdevice when a condition is met; decrypt a second temporary cardidentification number from the at least one encrypted cardidentification number; and replace the first temporary cardidentification number shown on the display with the temporary cardidentification number, and where the temporary card identificationnumber remains shown on the display after the power from the externalpower source is discontinued.

In some embodiments, the present disclosure provides a technicallyimproved computer-based method comprising: powering up a dynamiccellular card, upon receiving a power from an external power sourcehoused within a computing device; wherein the dynamic cellular card iswithout an internal power source; and where, when the dynamic cellularcard is powered up: transmitting, by the processor, a first temporarycard identification number associated with the dynamic cellular card tothe computing device; receiving, by the processor, at least oneencrypted card identification number from at least one server incommunication with the computing device when a condition is met;decrypting, by the processor, temporary card identification number fromthe at least one encrypted card identification number; and replacing, bythe processor, the first temporary card identification number shown on adisplay with the temporary card identification number, and where thesecond temporary card identification number remains shown on the displayafter the power from the external power source is discontinued.

In some embodiments, the present disclosure provides a technicallyimproved computer-based article comprising: a non-transitory computerreadable medium comprising code which, when executed by a processor,causes the processor to: power up a dynamic cellular card upon receivinga power from an external power source housed within a computing device;where the dynamic cellular card is without an internal power source; andwhere, when the dynamic cellular card is powered up, the instructionsfurther cause the processor to: transmit a first temporary cardidentification number associated with the dynamic cellular card to thecomputing device; receive at least one encrypted card identificationnumber from at least one server in communication with the computingdevice when a condition is met; decrypt a second temporary cardidentification number from the at least one encrypted cardidentification number; and replace the first temporary cardidentification number shown on a display with the second temporary cardidentification number, and where the second temporary cardidentification number remains shown on the display after the power fromthe external power source is discontinued.

In some embodiments, the present disclosure provides a technicallyimproved computer-based apparatus that includes at least the followingcomputer-based dynamic cellular card. A dynamic cellular card that canperform an interaction with a computing device using a first temporaryidentification card number, a first temporary primary account number, afirst temporary expiration date, and a first temporary card securitycode. The dynamic cellular card is without an internal power source andis powered up by an external power source housed within the computingdevice. The dynamic cellular card can receive at least a new temporaryidentification card number, a new temporary primary account number, anew temporary expiration date, and a new temporary card security codefrom a server in communication with the computing device. The dynamiccellular card can show the new set of new temporary card numbers on adisplay, replacing the first set of temporary card numbers or somesubset of those numbers with the new set of temporary card numbers. Thesecond temporary card numbers can remain shown on the display after theexternal power is discontinued. The new temporary card numbers can beused in a subsequent interaction with another computing device.

In some embodiments, the present disclosure provides a technicallyimproved computer-based apparatus that includes at least the followingcomponents of a computer-based fingerprint-enabled cellular card. Afingerprint-enabled cellular card, comprising: a processor; afingerprint sensor; a visual indicator; and a non-transitory memorystoring instructions which, when executed by the processor, cause theprocessor to power up the fingerprint-enabled cellular card uponreceiving a power from an external power source housed within acomputing device; where the fingerprint-enabled cellular card is withoutan internal power source; and where, when the fingerprint-enabledcellular card is powered up, the instructions further cause theprocessor to: detect a first fingerprint sample via the fingerprintsensor, where the first fingerprint sample is associated with a user ofthe fingerprint-enabled cellular card; and initiate an authenticationprocess of the first fingerprint sample before at least one transactionevent with the computing device, where the authentication process isbased on a match between a second fingerprint sample stored innon-transitory memory and the first fingerprint sample; and where adetermination of a match or no match between the first fingerprintsample and the second fingerprint sample is indicated by the visualindicator.

In some embodiments, the present disclosure provides a technicallyimproved computer-based apparatus that includes at least the followingcomponents of a computer-based fingerprint-enabled cellular card. Afingerprint-enabled cellular card, comprising: a processor; afingerprint sensor; a light-emitting diode; and a non-transitory memorystoring instructions which, when executed by the processor, cause theprocessor to power up the fingerprint-enabled cellular card uponreceiving a power from an external power source housed within acomputing device; where the fingerprint-enabled cellular card is withoutan internal power source; and when the fingerprint-enabled cellular cardis powered up, the processor is further configured to: receive via thefingerprint sensor a first fingerprint sample associated with a user ofthe fingerprint-enabled cellular card; configure the fingerprint-enabledcellular card to authenticate the user of the fingerprint-enabledcellular card based on a match between the first fingerprint sample anda second fingerprint sample; authenticate the second fingerprint samplebefore at least one transaction event; emit a light of a first lightcolor via the light-emitting diode upon a determination that the secondfingerprint sample has been successfully authenticated; and allow the atleast one transaction event upon the determination that the secondfingerprint sample has been successfully authenticated.

In some embodiments, the present disclosure provides a technicallyimproved computer-based method that includes at least the followingsteps. A method comprising: powering up a fingerprint-enabled cellularcard, by a processor, upon receiving a power from an external powersource; where the fingerprint-enabled cellular card is without aninternal power source and, where the fingerprint-enabled cellular cardcomprises a fingerprint sensor; receiving, by the processor, a firstfingerprint sample of a user of the card via the fingerprint sensor;receiving, by the processor, a second fingerprint sample of the user ofthe card via the fingerprint sensor; determining, by the processor,whether there is a match between the first fingerprint sample and thesecond fingerprint sample stored in a non-transitory memory comprised inthe fingerprint-enabled cellular card to allow or disallow thetransaction.

In some embodiments, the present disclosure provides a technicallyimproved computer-based system that includes at least the followingcomponents of an electronic-commerce fingerprint-enabled cellular cardcoupler system. The electronic e-commerce fingerprint-enabled cellularcard coupler system comprises a card coupler that is powered by acomputing device, and which communicates with a chip on afingerprint-enabled cellular card and with a merchant through a mobileapplication. When the fingerprint-enabled cellular card is inserted inthe card coupler, the coupler communicates with the fingerprint-enabledcellular card and the application on the merchant's website to transmitinformation stored on the chip to an authorization server as though thefingerprint-enabled cellular card had been used with a POS terminal atthe merchant location.

In some embodiments, the present disclosure provides a technicallyimproved computer-based system that includes at least the followingcomponents of a fingerprint-enabled cellular card with blue toothaccount registration and activation. The system comprises afingerprint-enabled cellular card with a fingerprint sensor, and a cardcoupler powered by a computing device and which communicates with amobile application on the computing device. When a user places theuser's finger on the fingerprint sensor on the card, and thefingerprint-enabled cellular card is inserted in the card coupler, thecard communicates success or failure of the fingerprint registration tothe application on the computing device using blue tooth low energy. Theapplication on the computing device confirms whether registration of theuser's fingerprint is successful or not. The fingerprint-enabledcellular card is activated if the fingerprint registration is successfuland transactions can now be processed using the card.

In some embodiments, the present disclosure provides a technicallyimproved computer-based system that includes at least the followingcomponents of a blue tooth enabled dynamic fingerprint-enabled cellularcard with user controlled programmable identification numbers. Thesystem comprises a dynamic fingerprint-enabled cellular card with afingerprint sensor according to various embodiments disclosed herein andwith programmable dynamic temporary card identification numbersaccording to embodiments disclosed herein. After a user authenticatesthe user's finger on the fingerprint-enabled cellular card, the user canuse a mobile application on a computing device to communicate with theuser's fingerprint-enabled cellular card via Bluetooth low energy andchange the identification number on the user's fingerprint-enabledcellular card to a new and temporary value of the user's choice.

In some embodiments, the present disclosure provides a technicallyimproved computer-based apparatus that includes at least the followingcomponents of a computer-based fingerprint-enabled digital displaycellular card. The computer-based fingerprint-enabled digital displaycellular card comprises a fingerprint-enabled cellular card comprising afingerprint sensor according to embodiments disclosed herein, a powersource; and a digital display on a fingerprint-enabled cellular card.Unlike a typical card, the fingerprint-enabled digital display cellularcard does not have a permanent expiration date, primary account number,4-digit card identification number, or a 3-digit card security codephysically or statically embossed or printed on the card. Instead, thefingerprint-enabled digital display cellular card has a digital displaythat is able to digitally display these card numbers. When the cardholder places their finger on the fingerprint sensor on thefingerprint-enabled cellular card and the card holder's fingerprint isauthenticated, the digital display on the card illuminates on thedigital display and digitally displays relevant card data and numbersincluding but not limited to a digital card expiration date, a digitalprimary account number, a digital 4-digit card identification value, ora digital 3-digit card security code.

BRIEF DESCRIPTION OF THE DRAWINGS

Various embodiments of the present disclosure can be further explainedwith reference to the attached drawings, wherein like structures arereferred to by like numerals throughout the several views. The drawingsshown are not necessarily to scale, with emphasis instead generallybeing placed upon illustrating the principles of the present disclosure.Therefore, specific structural and functional details disclosed hereinare not to be interpreted as limiting, but merely as a representativebasis for teaching one skilled in the art one or more illustrativeembodiments.

FIGS. 1-29 show one or more schematic flow diagrams, certaincomputer-based architectures, and/or implementations which areillustrative of some examples of aspects of at least some embodiments ofthe present disclosure.

DETAILED DESCRIPTION

Various detailed embodiments of the present disclosure, taken inconjunction with the accompanying figures, are disclosed herein;however, it is to be understood that the disclosed embodiments aremerely illustrative. In addition, each of the examples given inconnection with the various embodiments of the present disclosure isintended to be illustrative, and not restrictive.

As used herein, the term “card” can refer to an electronic card with atleast one embedded microprocessor. In some embodiments, a card can becontact-based or a contactless card. A contact-based card can include anintegrated circuit chip and/or other physical or electrical terminalsthat allows the card to communicate with a computing device. In someembodiments, the card can be a contactless or dual interface (“DI”) cardthat may additionally communicate from a distance with a computingdevice through radio frequency identification (RFID) technology, nearfield communication (NFC) technology, or other type of radio waves orsignals. For example, when held at a predetermined distance from acomputing device, a contactless card may be configured to use one ormore antennas to transmit data stored in the card and receive data froma computing device.

In some embodiments, the card may be dimensioned and/or be utilized suchas, but not limited to, a conventional credit or debit card issued toaccount holders by banks and other financial institutions. In someembodiments, the card may be dimensioned and/or be utilized such as, butnot limited to, personal identification cards, health entitlement cards,store loyalty cards, stored value cards (electronic purses), informationstorage cards, and the like. In some embodiments, the card may bedimensioned, but not limited to, in accordance with internationalstandard ISO/IEC 7810, ID-1 format, which specifies dimensions of 85.60mm (85.60×10-3 m) long by 53.98 mm (53.98×10-3 m) wide. In someembodiments, the card may be dimensioned, but not limited to, inaccordance with international standard ISO/IEC 7813 which furtherspecifies the thickness as 0.76 mm (0.76×10-3 m). For example, the cardmay be made of a plastic material, metal or similar material, and mayhave convenient overall dimensions of 7.5 cm by 11 cm by 1 cm similar toa common wallet.

As used herein, the term “cellular card” can refer to the card that hasbeen technologically improved to operate in accordance with the presentdisclosure and which may be recognized and registered by a mobilenetwork carrier and associated with a mobile account of the cardholderand which can communicate with a cellular network.

A cellular card may include a “dynamic cellular card”, a “finger-printenabled cellular card”, a “fingerprint-enabled digital display card”, a“dynamic fingerprint-enabled cellular card”, or any subset orcombinations of these cards.

As used herein, the term “dynamic cellular card” can refer to the cardthat has been technologically improved to operate in accordance with thepresent disclosure and that may comprise: temporary card identificationnumbers that may be electronically changeable by a remote host or auser; and which can communicate with a cellular network.

As used herein, the term “fingerprint-enabled cellular card” can referto the card that has been technologically improved to operate inaccordance with the present disclosure and that may comprise: afingerprint sensor for fingerprint authentication or registration; andwhich can communicate with a cellular network.

As used herein, the term “dynamic fingerprint-enabled cellular card” canrefer to the card that has been technologically improved to operate inaccordance with the present disclosure and that may comprise: afingerprint sensor for fingerprint authentication or registration;temporary card identification numbers that may be electronicallychangeable by a remote host or a user; and which can communicate with acellular network.

As used herein, the term “fingerprint-enabled digital display cellularcard” can refer to the card that has been technologically improved tooperate in accordance with the present disclosure and that may comprise:a fingerprint sensor for fingerprint authentication or registration; adigital display to display temporary card identification or accountnumbers associated with the card; and which can communicate with acellular network.

As used herein, the term “computing device” can refer to any electronicdevice that can receive, transmit, and/or process data stored in thedynamic cellular card. In some embodiments, a computing device caninclude a power source that may be able to power up the dynamic cellularcard and receive data from a server.

As used herein a “point of sale (POS)” terminal can refer to thecomputing device implemented with a combination of hardware and softwareand can include a contact-based and/or a contactless card-reader device.In some embodiments, the contact-based card-reader device cancommunicate with the dynamic cellular card via an integrated circuitchip and/or other physical or electrical terminals embedded in thedynamic cellular card. In some embodiments, a contactless card-readerdevice can use RFID technology, NFC technology, or other type of radiowaves or signals to communicate with the dynamic cellular card. In someembodiments, a “transaction event” between the dynamic cellular card andthe computing device, such as a POS terminal, may include acontact-based transaction or a contactless transaction event.Non-limiting example of a POS terminal can include Shopkeep®,Lightspeed®, Touchbistro®, Upserve®, Toast®, Springboardretail®, Vend®or other suitable types of technologies.

The POS terminal may be on-premise or cloud based. On-premise POSterminals may install software and use data stored on local servers thatrun on a closed internal network. Cloud-based POS terminals may besubscription-based software as a service (SaaS) and accessed over theinternet on any browser. POS terminals in the cloud may be independentfrom platform and operating system limitations, and may be compatiblewith a variety of POS hardware.

As used herein, term “cloud” and similar terms correspond to at leastone of the following: (1) a large number of computers connected througha real-time communication network (e.g., Internet); (2) providing theability to run a program or application on many connected computers(e.g., physical machines, Virtual Machines (VMs)) at the same time; (3)network-based services, which appear to be provided by a hardware of onetype running (Operating System) OS of one type may emulate hardware of adifferent type and/or an OS of a different type, and are in fact servedup by virtual hardware (e.g., virtual servers), simulated by softwarerunning on one or more real machines (e.g., allowing to be moved aroundand scaled up (or down) on the fly without affecting the end user).

As used herein, the term “card identifying data” can include data orkeys that may allow a mobile network carrier to recognize and register acard and associate the card with a user mobile account of a userassociated with the card. “Card identifying data” may also includegeo-location data identifying a physical location of the card such asGlobal Positioning System (“GPS”) data.

As used herein, the term “user mobile account” can refer to a mobileaccount of a user or card holder provided by a mobile network carrier.

As used herein, the term “user mobile account data” can refer to dataassociated with a user mobile account that can be used to access yourserver-based network user account remotely.

As used herein, the term “user card account” can refer to an account ofa user associated with a card. In some embodiments, the user cardaccount may comprise data regarding the card holder including but notlimited to personal data e.g., name, address, social security number,telephone numbers, or other suitable personal data) or purchase ortransaction data. In some embodiments, the entity that issued the cardmay provide the user card account.

As used herein, the term “user-associated private key” can refer to apassword, phrase, or other code associated with a user's mobile accountdata and which may allow authentication of the card or user. In someembodiments, a user-associated private key may be private and/or secureand may be encrypted.

As used herein, the term “mobile network carrier” can refer to any knownwireless service provider that provides cellular services to mobilephones or other devices. Mobile network carriers can include but are notlimited to providers such as T-Mobile®, Verizon®, Sprint®, or AT&T®.

As used herein, the term “card holder”, “user of a/the card” or “carduser” can be at least one user or at least one non-person entityassociated with the card.

As used herein, a “power” can refer a rate at which energy istransferred to and from a part of an electric circuit. For example, thepower can be transferred by supplying AC or DC electrical charge in acontact-based interaction. For example, the power can be transferredinductively, by generating, but not limited to, time-varyingelectromagnetic field during a contactless interaction between atransmitting device and a receiving device that converts the receivedpower to DC or AC electric charge to be used by the electric circuithosted by the receiving device.

As used herein a “power source” can refer to a suitable source ofsupplying the power. For example, the power source is a source of AC orDC power supplied during the contact-based interaction and can befunctionally equivalent to plugging into a wall power source or chargingfrom another device such as a desktop or laptop computer. For example,the power source is a source of AC or DC power combined with atransmitting device that generates, but is not limited to, time-varyingelectromagnetic field during a contactless interaction between thetransmitting device having a transmitting antenna and a receiving devicehaving a receiving antenna.

As used herein an “external power source” is the power source supplyingthe power to the card but which resides separately from the dynamiccellular card. For example, as disclosed herein, a POS terminal can bethe external power source. In some embodiments, the external powersource can supply electrical charge via a contact-based interactionbetween electrical terminals of the dynamic cellular card and electricalterminals of the external power source. In some embodiments, theexternal power source can supply, additionally or alternatively,electrical charge via a contactless interaction between the dynamiccellular card and the external power source.

As used herein an “internal power source” is the power source that isnot the external power source. In some embodiments, the internal powersource resides within the dynamic cellular card and can include, but notlimited to, a primary battery, a rechargeable battery, or an alternativepower source. For example, an alternative power source, or a combinationof alternative power sources can be, but not limited to, a supercapacitor, a solar cell, and/or a bioenergy power source.

As used herein a “permanent card identification number” can refer to,for example, a set of numbers used to identify a card issuer and a cardholder.

As used herein a “temporary card identification number” can refer to,for example, a Card Verification Value (CVV), a Card Verification Code(CVC), a Card Identification Number (CID), or other suitable numberassociated with a card.

As used herein a “transaction event” can refer to a contact-based and/orcontactless transaction performed with a card and a computing device. Insome embodiments, the computing device can refer to a POS terminal. Insome embodiments, a transaction event can include a purchase eventassociated with an amount and at least one purchased item. In someembodiments, a transaction event can refer to an e-commerce transaction,a transaction made using a POS terminal, or other suitable transactions.

The following embodiments provide technical solutions and/or technicalimprovements that overcome security technical problems, drawbacks and/ordeficiencies in the technical field of cards. As explained in moredetail below, technical solutions and/or technical improvements hereininclude aspects of improved card systems resilient to fraudulent use.Moreover, various practical applications of the disclosed technology arealso described, which provide further practical benefits to users andoperators that are also new and useful improvements in the art.

In some embodiments, a dynamic cellular card can be used to accomplishdifferent types of secure transactions including transactions via acomputing device, contactless transactions, and e-commerce transactions,over the phone transactions, and other suitable types of transactions.Various embodiments are directed to the technical problem of unsecure orfraudulent transactions providing at least one technical solution thatincludes recurrently changing card identification numbers shown on acard display. For example, the showing of the permanent CardVerification Value (CVV), Card Verification Code (CVC), or CardIdentification Number (CID) on the card facilitates fraudulenttransactions. Instead, various embodiments of the present disclosureprovide various technical solutions to such a technical problem byallowing dynamic cellular cards of the present disclosure to display thetemporary card identification number based on encrypted communications.In some embodiments, the temporary card identification number preventsfraudulent transactions by being a single-use number. In someembodiments, the temporary card identification number preventsfraudulent transactions by being a time-limited use number.

Various embodiments provide a technical solution by enabling the dynamiccellular card to operate without an internal battery, powered up by anexternal power source, overcoming technical problems associated withbattery overheating, battery short life time, battery underperformancein extreme temperatures, and other types of drawbacks associated withbatteries contained in cards and other suitable devices.

In some embodiments, a fingerprint-enabled cellular card can include afingerprint sensor and a non-transitory memory that stores a fingerprintsample collected from the fingerprint sensor and associated with a useror card holder. Some embodiments of the present disclosure are directedto a technical problem of unsecure and fraudulent transactions. In someembodiments, the fingerprint-enabled cellular card of the presentdisclosure solves this problem by at least deterring unsecure orfraudulent transactions by executing an authentication process when thefingerprint-enabled cellular card is used. In some embodiments, thefingerprint-enabled cellular card is configured to authorize atransaction when a fingerprintsample read via the fingerprintsensormatches the fingerprintsample stored in the non-transitory memory. Someembodiments of the present disclosure are directed to a technicalproblem of batteries contained in a fingerprint-enabled cellular card,such as, but not limited to, battery overheating, battery short lifetime, battery underperformance in extreme temperatures, and other typesof drawbacks associated with batteries contained in cards. In someembodiments, the fingerprint-enabled cellular card of the presentdisclosure solves this problem by not requiring a battery or any powersource contained within the fingerprint-enabled cellular card. In someembodiments, the fingerprint-enabled cellular card can operate withoutan internal battery and is powered up by an external power source,overcoming drawbacks associated with batteries contained in cards andother suitable devices.

Some embodiments of the present disclosure are directed to a technicalproblem of batteries contained in a card, such as, but not limited to,battery overheating, battery short life time, battery underperformancein extreme temperatures, and other types of drawbacks associated withbatteries contained in cards. In some embodiments, the card of thepresent disclosure solves this problem by not requiring a battery or anypower source contained within the card. In some embodiments, the cardcan operate without an internal battery and is powered up by an externalpower source, overcoming drawbacks associated with batteries containedin cards and other suitable devices.

FIGS. 1-29 illustrate examples of apparatus and methods ofcomputer-based cards, in accordance to the present disclosure.

FIG. 1 illustrates an example of a block diagram of an implementation ofa cellular card, in accordance with one or more embodiments of thepresent disclosure. As shown in FIG. 1, to enable secure financialtransactions, at step 100, chip manufacturers may load data, includingcustomer-supplied or encrypted keys, onto chips that are embedded oncards. At step 101, card issuing entities may also load data onto thecards. The data loaded by the card issuing entities may also includedata and keys used to pre-personalize or personalize cards.

At step 102, at least one mobile network carrier may also load a privatekey and associated mobile network carrier data onto the card. The dataloaded by the mobile carrier networks may include data and keys used topre-personalize or personalize smart phone cards or the chips on mobilephones, such as Subscriber Identity Module (“SIM”) cards, and mayinclude customer-supplied or encrypted keys that allow authentication ofthe card by the mobile network carrier.

In accordance with one or more embodiments of the present disclosure,FIG. 2 depicts chip manufacturer 200 loading data and associated privatekeys onto card 201. Card issuing entity 202 also loads data andassociated private keys onto card 201. Mobile carrier network 203 alsoloads data and associated carrier network onto card 201.

FIG. 3 is an illustrative block diagram of an example of animplementation of a cellular card, according to one or more embodimentsof the present disclosure. At step 300, the mobile carrier networkregisters and activates the cellular card as a mobile device of the cardholder. At step 301, the user's mobile account of the mobile carrier islinked to the user's card account of the card issuer such that the twolinked accounts can communicate and share information with each other.

In accordance with one or more embodiments of the present disclosure,FIG. 4 depicts an example of a cellular card and computing device of thepresent disclosure. At step 400, the cellular card is powered by anexternal power source. When powered by an external power source, at step401, the cellular card is configured to communicate with a cellularnetwork. At step 402, the cellular network communicates with cardholder's linked card account of card issuer and mobile account of mobilecarrier and provides real-time bi-directional information exchangebetween the accounts.

FIG. 5 depicts an illustrative schematic in accordance with at leastsome embodiments of the present disclosure in which cellular card 500may be powered by an external power source and communicates with acellular network. At step 501, cellular card 500 may be powered bycontact insertion or swiping into a computing device such as a POSterminal. At 502, cellular card 500 may be powered by for example,tapping the cellular card against a computing device 502 or usingcellular card 500 in a contactless manner with a computing device 502,by holding cellular card 500 at a predetermined distance from acomputing device 502 until cellular card 500 transmits and receives datafrom the computing device. Regardless of whether cellular card 500 isused in a contactless or contact-based manner, the computing devices 501and 502 may supply power to the cellular card that allows cellular card500 to communicate with cellular network 503. Cellular card 500 may, forexample, provide geo-location data to the cellular network tower. Otherdata may additionally be transmitted between the cellular card and thecellular tower and between the cellular tower and the card holder'slinked payments and mobile accounts.

Cellular card 500 may use at least one or more antennas that may be ableto send relevant signals to a cellular network 503 or a computing device(including but not limited to 501 or 502) over a cellular frequency.When cellular card 500 is also a dual interface (“DI”) paymentscard/contactless card, cellular card 500 may be configured to utilizemultiple antennas.

An example of one of the embodiments of the present disclosure maycomprise the following. At card initialization, chip manufacturer 200pre-personalizes the chip that is embedded in card 200 with data andassociated keys. Chip manufacturer 200 sends the chip to card issuingentity 202 who also securely loads its own data and keys onto the chipto pre-personalize the chip. Chip issuing entity then affixes thepre-personalized chip onto card 201.

Card 201 may be registered with the mobile carrier network 203 as amobile device of the user such that the card is now a mobile device onthe card holder's mobile account (“a cellular card”). The card holder'smobile device account and financial transaction accounts may further belinked to facilitate communication between the card holder's mobiledevice account and the cellular card holder's financialtransactions'/payments' account. For example, the card holder may visita brick and mortar mobile store such as Verizon or T-Mobile and registertheir card as a mobile device on their mobile account at Verizon orT-Mobile and link their mobile account to their payments account. Thecard holder may also use their mobile wallet application to performsecure registration and linkage of their accounts.

In some embodiments, when the card is powered up, the processor on card201 may register card 201 with a user mobile account of a userassociated with card 201 and transform card 201 into a user-associatedmobile card device (“a cellular card”). The processor on card 201 mayreceive, from the mobile network carrier 203, user mobile account datathat comprises a user-associated private key and transmit the usermobile data to a computing device of a card issuing entity 202 thatissued card 201 in order to associate the user mobile account with theuser's payment account based at least in part on the user-associatedprivate key; and share the user mobile account data and payments accountdata between the mobile network carrier 203 and the card issuing entity202.

An example of one of the embodiments of the present disclosure maycomprise the following. When cellular card 500 is powered up by anexternal power source 501 or 502, a processor on card 500 may establish,via an antenna on a chip on card 500, a first wireless communicationwith at least one cellular network tower 503 associated with a mobilenetwork carrier during an interaction between card 500 and computingdevice 502 or 503. The processor on card 500 may provide, with the firstwireless communication, card identifying data to the mobile networkcarrier. As earlier defined, card identifying data includes but is notlimited to data or keys that may allow a mobile network carrier torecognize and register a card and associate the card with a user mobileaccount of a user associated with the card. Card identifying data mayalso include geo-location data identifying a physical location of thecard such as “Global Positioning System” (“GPS”) data.

Further, the processor on card 500 may establish via at least onecellular network tower 503, a second communication with the computingdevice of a card issuing entity to transmit user mobile account data tothe computing device of the card issuing entity. Cellular card 500 maytransmit information regarding the financial transaction at issue, suchas a purchase event, including but not limited to an amount and at leastone purchased item.

The second communication may also include the generation of an alert,such as a ping, to cellular network 503. The data may also comprisegeo-location data identifying a physical location of card 500 such thatinformation regarding the whereabouts of the cellular card and its usemay be transmitted to the computing device of a card issuing entity forfurther transmission to the card holder.

When cellular card 500 is powered up by computing device 501 or 502, theprocessor on cellular card 500 may establish via an electronic walletapplication associated with the card issuing entity and executed onanother mobile device, a second communication with the computing deviceof card issuing entity to transmit user mobile account data to the cardissuing entity computing device of the card issuing entity.

When cellular card 500 is powered up by computing device 501 or 502, theprocessor on cellular card 500 may also establish, via the computingdevice 501 or 502, a second communication with the card issuing entitycomputing device to transmit user mobile account data to the computingdevice of the card issuing entity.

Based on the communications between cellular card 500 and cellularnetwork 503, cellular card 500 may be able to alert the card holder,financial services company, or mobile network carrier, or any relevantparty connected to cellular network 503 that cellular card 500 is inuse, and information regarding cellular card 500, including but notlimited to the physical location of cellular card 500 may be obtained.The card holder, financial services company, or mobile network carriermay be able to make and take further decisions regarding cellular card500, including determining whether use of cellular card 500 isfraudulent, and disabling and enabling use of cellular card 500 asnecessary.

The advantages of the system and method disclosed herein over existingsystems include the following: providing a payments card with “cellular”capabilities by making the card capable of using the card holder'smobile account to collect data including for example, real timenotification of where the card is being used. While the cellular cardcontinues to provide payment card capabilities, when powered by anexternal power source, the cellular card may also send data to thenearest cellular tower. This may include registering the card as amobile device of the card holder and linking the payment account of thecellular card to the mobile account and allowing data between the twoaccounts to be shared and utilized. Communication between the cellularcard and the cellular network enables the card to communicate with thecard holder (applications provider or mobile network carrier) over theestablished cellular infrastructure and provide real-time informationwithout depending on the merchant POS terminal for communication to ahost. The cellular card may deter fraud since the card can act as atracking device that may not be easily disabled like a phone, but whichmay still be used for payments.

FIG. 6 illustrates an example of an implementation of a dynamic cellularcard 600, in accordance with one or more embodiments of the presentdisclosure. In some embodiments, the dynamic cellular card 600 caninclude a communication bus 601, a processor 607, a non-transitorymemory 603, an output device interface such as, but not limited to,display 609, and at least one of: a contactless antenna 605 (inembodiments having the contactless interactions) an integrated circuitchip 611 (in embodiments having the contact-based interactions), or acombination of the contactless antenna 605 and the integrated circuitchip 611 (in embodiments having capability for the contactless and/orcontact-based interactions).

In some embodiments, the communication bus 601 communicatively connectstwo or more internal devices of the dynamic cellular card 600. Forexample, the communication bus 601 can be, for example, a physicalinterface for interconnecting the various components or internaldevices.

In some embodiments, the dynamic cellular card 600 may include aprocessor 607 configured to perform instructions upon receiving powerfrom an external power source provided via the communication bus 601 by,e.g., the computing device not shown in FIG. 6.

In some embodiments, the non-transitory memory 603 may include any typeof computer memory that retains data after the dynamic cellular card 600is powered off. For instance, the non-transitory memory 603 can storeone or more encrypted card identification numbers with time stamps,where such card identification numbers include temporary cardidentification numbers that can be updated throughout multipleinteractions between the dynamic cellular card 600 and other computingdevices as discussed below with reference to FIGS. 8-13.

In some embodiments, display 609 can be an electrophoretic display orother suitable display that retains an image even when all power sourcesare removed from the dynamic cellular card generally or the displayspecifically. In some implementations, the display 609 may only consumepower whenever the displayed image changes. The display 609 can displaytemporary card identification numbers retrieved and decrypted from a setof encrypted card identification numbers stored in the non-transitorymemory 603.

In some embodiments, contactless antenna 605 can include a RadioFrequency Identification (RFID) system, a Near Field Communication (NFC)system or other suitable system that enables the dynamic cellular card600 to transmit data to other computing devices in a contactlessinteraction. In some implementations, the contactless antenna 605 canreceive electromagnetic waves (e.g., by radio frequency induction) froma computing device, wherein such electromagnetic waves can power up thedynamic cellular card 600. In some instances, the dynamic cellular card600 can be powered up via the contactless antenna 605 and thereafterretrieve and decrypt a temporary card identification number from the setof encrypted card identification numbers stored in the non-transitorymemory 603. The dynamic cellular card 600 can then show the temporarycard identification number on the display 609 such that the numberremains shown on the display after the contactless interaction has beenterminated.

In some embodiments, the integrated circuit chip 611 can provide thedynamic cellular card 600 with electrical connectivity to an externalpower source when inserted into a computing device. In some embodiments,the integrated chip may comply with the EMV standard published by EMVco.In some embodiments, the processor 607 can be embedded into theintegrated circuit chip 611. In some instances, upon interaction withthe computing device, the dynamic cellular card 600 sends and receivesinformation from the computing device and/or a server in communicationwith the computing device. In some instances, the dynamic cellular card600 receives a set of encrypted card identification numbers from theserver in communication with the computing device or reader device.

In some instances, the display 609 displays a first temporary cardidentification number prior to the interaction between the dynamiccellular card 600 and the computing device (e.g., POS terminal). Afterthe dynamic cellular card 600 is powered up upon the interaction withthe computing device, instructions stored in the non-transitory memory603 cause the processor 607 to receive and store in the non-transitorymemory 603 one or more encrypted card identification numbers from atleast one server in communication with the computing device, retrieve anencrypted card identification number from the non-transitory memory 603and decrypt the encrypted card identification number to obtain a secondtemporary card identification number, and replace the first temporarycard identification number with the second temporary card identificationnumber on the display 609. For example, the instructions stored in thenon-transitory memory 603 cause the processor 607 to decrypt theencrypted card identification number utilizing, without limitation,private/public key pair techniques, Triple Data Encryption Standard(3DES) techniques, block cipher algorithms (e.g., IDEA, RC2, RCS, CASTand Skipjack), and/or cryptographic hash algorithms (e.g., MDS,RIPEMD-160, RTRO, SHA-1, SHA-2, Tiger (TTH), WHIRLPOOL, RNGs).

FIG. 7 illustrates an example of a dynamic cellular card, in accordancewith one or more embodiments of the present disclosure. In someimplementations, the dynamic cellular card 700 can be associated with auser. In this example, the user name may be engraved on the dynamiccellular card as shown at 703. The dynamic cellular card 700 can alsoinclude an expiration date as shown at 705. In some implementations, thedynamic cellular card 700 can include a permanent card identificationnumber as shown at 707 and a temporary card identification number shownon display 709. The permanent identification card number and/or thetemporary identification card number can be associated with a creditcard account. The user name 703 engraved or printed on the dynamiccellular card may be responsible for or associated with such credit cardaccount. In some instances, the permanent card identification number 707can be used in conjunction with the temporary card identification numbershown on display 709 to interact with a computing device. For example,the permanent card identification number 707 and the temporary cardidentification number shown on display 709 can be utilized to executesecured transactions, authenticate a card holder, or other suitableinteractions with a computing device. For another example, the permanentcard identification number can be used in an interaction with acomputing device while the temporary card number is updated or changedby the computing device. In some instances, one or more of theinformation shown at 703, 705, 707, and 709 can be transmitted to acomputing device via the integrated circuit 111 or via the contactlessantenna 605 discussed with reference to FIG. 6.

FIG. 8 illustrates a swim lane diagram illustrating examples ofcomputations executed by the dynamic cellular card, in accordance withone or more embodiments of the present disclosure. The swim lane diagramshown in FIG. 8 includes operations of the dynamic cellular card 600, acomputing device such as a point of sale (POS) terminal 803, and anauthorization host server 805. A POS terminal 803 is a computing devicethat can include a card-reader device and be implemented with acombination of hardware and software enabling retail locations to acceptcard payments. A POS terminal can read information from a dynamiccellular card 800 via a card-reader device and, in combination with theauthorization host server 805 and other systems as appropriate, verifywhether the funds available to the user are sufficient for atransaction, transfer funds from a customer's account to a seller'saccount, and/or record the transaction in the customer and selleraccounts. In some instances, the dynamic cellular card can initiate aninteraction with the POS terminal 803. As discussed above, in someinstances, the initiation of the interaction can include inserting thedynamic cellular card 600 into the POS terminal for the contact-basedinteraction. As discussed above, in some instances, the initiation ofthe interaction can include moving the dynamic cellular card 600 near orproximate to the POS terminal so that the receiving antenna 605 of thedynamic cellular card 600 can receive the power from a transmittingantenna of the POS terminal and is subject to electromagnetic field suchthat the interaction can be a contactless interaction. At 809, thedynamic cellular card 600 receives power (e.g., electrical charge,electromagnetic waves) from an external power source, in this case fromthe POS terminal 803.

In some embodiments, the dynamic cellular card 600 may determine whetherencrypted card identification numbers should be obtained based on thesatisfaction of a condition. In some embodiments, the condition may bebased on information that is available to the dynamic cellular card 600without retrieving additional information from other components of thesystem 1300 described in FIG. 13. For instance, processor 607 maycompare and determine whether the quantity of additional encrypted cardidentification numbers stored in non-transitory memory 603 exceeds athreshold. The threshold may be fixed (e.g., zero or another positivenumber less than 5) or dynamically determined (e.g., based on howfrequently the dynamic cellular card 600 was recently used to makepurchases that require the use of a temporary card identificationnumber). In addition, or alternatively, when dynamic cellular card 600is inserted in POS terminal 803, it may be provided with a signal fromauthorization host server 805 that encrypted card identification numbersshould be obtained in addition to, or as a replacement for, theencrypted card identification numbers stored in non-transitory memory603 (if any). In other embodiments, the condition may be based oninformation that is retrieved from devices external to the dynamiccellular card 600, such as an indication from authorization host server805 via POS terminal 803 to retrieve additional encrypted cardidentification numbers.

Thereafter, at 811 the dynamic cellular card 600 can send authenticationdata with a request for a set of encrypted card identification numbersto the POS terminal 803. Such authentication data can include a name703, expiration date 705, permanent identification number 707, andtemporary card identification number rendered on the display 609discussed with reference to FIG. 7 and/or other suitable authenticationdata or data computed by the dynamic cellular card for the interactionwith the POS terminal 803.

In some embodiments, at 813 the POS terminal 803 can send an interactionauthorization request to the authorization host server 805. Such arequest can be sent via the cloud or network discussed with reference toFIG. 13, or other suitable type of computing device communicationsystem. In some instances, the interaction authorization request caninclude one or more of the data sent by the dynamic cellular card 600 tothe POS terminal 803 including a request for a set of encrypted cardidentification numbers.

In some embodiments, the authorization host server 805 can, inreal-time, authenticate the dynamic cellular card 600 and produce a setof encrypted card identification numbers. Accordingly, the authorizationhost server 805 can authorize the interaction and respond to theinteraction authorization request with a set of encrypted cardidentification numbers as shown at 815. Such a set of encrypted cardidentification numbers can be preapproved by the authorization hostserver for a user, such that, the user can utilize decrypted cardidentification numbers from the set of encrypted card identificationnumbers in electronic transactions, for example, e-commercetransactions, transactions made through a POS terminal, or othersuitable transactions. Thereafter, the dynamic cellular card 600 canreceive the authorization response with the set of encryptedidentification numbers from, for example, the POS terminal 803 as shownat 817. The dynamic cellular card 600 can then store the set ofencrypted identification numbers in the non-transitory memory 603,select, and decrypt an identification number from the set of encryptedidentification numbers to produce a new temporary card identificationnumber. As discussed above, the dynamic cellular card 600 can show thenew temporary card identification number on the display 609 while thedynamic cellular card 600 is being powered up by the POS terminal 803.Thereafter, at 819 the dynamic cellular card 600 can conclude theinteraction with the POS terminal 803 using data associated with thedynamic cellular card 600. The new temporary card identification numbercan remain shown on the display 609 and be utilized in a secondinteraction with for example, a second computing device. For instance,the webpage of a merchant may prompt the user to enter the temporarycard identification number shown on the display 609 when the userengages in a transaction, and the temporary card identification numbermay be used to authenticate the transaction.

FIG. 9 is a flowchart illustrating examples of computations executed bythe dynamic cellular card 100, in accordance with one or moreembodiments of the present disclosure. In some instances, the dynamiccellular card 600 can initiate a first interaction with a computingdevice using, for example, a first temporary card identification numberand a permanent card number associated with the card as shown at 901. Asdiscussed above, the dynamic cellular card 600 can power up from anexternal power source, for example using power from the computing deviceduring the interaction as shown at 903. In some instances, the dynamiccellular card 600 can determine an absence of unused encrypted cardidentification numbers as shown at 405.

In some embodiments, the dynamic cellular card 600 can send a signal toan authorization server via the computing device to request a set ofencrypted card identification number and in response to the requestreceive the set of encrypted card identification numbers as shown at907. Thereafter, at 909 the dynamic cellular card 600 can decrypt asecond temporary card identification number selected from the set ofencrypted card identification numbers. At 911, the dynamic cellular card600 can replace the first temporary card identification number with thesecond temporary card identification number. The dynamic cellular card600 renders on the display the second temporary card identificationnumber. The second temporary card identification number can remain shownon the display after the first interaction with the computing device isterminated. In some instances, as shown at 913, the dynamic cellularcard 600 can use the second temporary card identification number in asecond interaction with for example, a second computing device in whichthe card is not powered up by any other external power source, forexample, in an e-commerce transaction where a user submits dataassociated with the dynamic cellular card. Such data can include, forexample, a permanent card identification number, the second temporarycard identification number, user name, expiration date or other suitabledata.

FIG. 10 is a flowchart illustrating examples of computations executed bythe dynamic cellular card, in accordance with one or more embodiments ofthe present disclosure. In some instances, the dynamic cellular card 600can initiate an interaction with a computing device using a firsttemporary card identification number associated with the dynamiccellular card as shown at 1001. Such an interaction can be, for example,a contactless interaction, an insertion of the card into the computingdevice or other suitable type of interaction. In some instances, asshown at 1003, the dynamic cellular card 600 can power up with powerreceived from the computing device during the interaction, for example,in a contactless interaction, the card can receive RFID signals orelectromagnetic waves from the computing device that can power up thedynamic cellular card 600.

In some embodiments, the dynamic cellular card 600 can determine if afirst temporary card identification number has been displayed on thedynamic cellular card above a threshold time as shown in the conditionalstatement 1005. In some instances, such a determination can be madebased on a timestamp associated with the first temporary cardidentification number. In some instances when the first temporary cardidentification number has not been displayed above the predeterminedthreshold time, the dynamic cellular card 600 concludes the interactionwith the computing device using data associated with the dynamiccellular card 600 as shown at 1011. Such data can include, for example,a permanent card identification number, a user name, an expiration date,a temporary card identification number or other suitable data associatedwith the dynamic cellular card 600.

In some embodiments, when the dynamic cellular card 600 determines thatthe first temporary card has been displayed on the card above apredetermined threshold time as shown in conditional statement 1005 theflow proceeds to 1009. At 1009 the dynamic cellular card 600 can selectand decrypt a second temporary card identification number. The secondtemporary card identification number can remain displayed after theexternal power is discontinued. Thereafter, the flow proceeds to 1011 asdiscussed above. It is noted that in some instances, the data associatedwith the dynamic cellular card 600 can include the first temporary cardidentification number or the second temporary card identification numberdepending on the outcome of the conditional statement 1005 discussedabove.

FIG. 11 are examples of interactions between the dynamic cellular card600 and a computing device, in accordance with one or more embodimentsof the present disclosure. In some instances, the dynamic cellular card600 can be associated with a first temporary card identification number609A. The dynamic cellular card 600 can be inserted into a computingdevice, for example, POS terminal 803. The POS terminal 803 can send anauthorization message 1105 to the authorization host server 805. In someinstances, the authorization host server 805 can send an authorizationresponse 1109 with a set of new encrypted card identification numbers.The dynamic cellular card 600 can receive the authorization response1107 with the set of new encrypted card identification numbers.Thereafter, the dynamic cellular card 600 can select and decrypt anencrypted card identification number from the set of new encrypted cardidentification numbers to produce a second temporary card identificationnumber. The second temporary card identification number 609B can beshown on the dynamic cellular card 600 and used in a subsequentinteraction with a different computing device.

FIG. 12 is an example of a contactless interaction between the dynamiccellular card and a computing device, in accordance with one or moreembodiments of the present disclosure. In some instances, the dynamiccellular card 600 can be placed near a computing device, for example,contactless POS terminal 1201. The contactless POS terminal 1201 canemit electromagnetic waves or RFID signals 1203 received by the dynamiccellular card 600. The dynamic cellular card 600 can use theelectromagnetic waves to power up and send data to the contactless POSterminal 1201. As discussed above, examples of such data can include apermanent card identification number, a first temporary cardidentification number 609C, a user name, an expiration date, and/orother suitable data associated with the dynamic cellular card 600. Thecontactless POS terminal 1201 can use such data to send an authorizationmessage 1207 to the authorization host server 805.

In some embodiments, the dynamic cellular card 600 can be powered up bythe electromagnetic waves 1203. The dynamic cellular card 600 canretrieve from memory and decrypt an encrypted card identification numberto produce a second temporary card identification number 609D while thedynamic cellular card 600 is powered up by the electromagnetic waves1203. Additionally, the dynamic cellular card 600 can show the secondtemporary card identification number 609D on the display also while thedynamic cellular card 600 is powered up by the electromagnetic waves1203. In some instances, the contactless POS terminal 1201 can receivean authorization response 1209 from the authorization server 805approving the contactless interaction. It is noted that the secondtemporary card identification number 609D can remain shown on thedisplay after the electromagnetic waves 1203 are discontinued.

FIG. 13 depicts a block diagram of an example of a computer-based system1300, in accordance with one or more embodiments of the presentdisclosure. However, not all these components may be required topractice one or more embodiments, and variations in the arrangement andtype of the components may be made without departing from the spirit orscope of various embodiments of the present disclosure. In someembodiments, the computing devices and/or the computing components ofthe computer-based system 1300 may be configured to manage large numbersof members and/or concurrent transactions or electronic activities, asdetailed herein. In some embodiments, the computer-based system 1300 maybe based on a scalable computer and/or network architecture thatincorporates varies strategies for assessing the data, caching,searching, and/or database connection pooling. An example of thescalable architecture is an architecture that is capable of operatingmultiple servers.

In some embodiments, referring to FIG. 13, members POS terminal 1301,contactless POS terminal 1303, and client device 1305 (e.g., clients) ofthe computer-based system 1300 may include virtually any computingdevice capable of receiving and sending a message over a network (e.g.,cloud network), such as network 1307, to and from another computingdevice, such as server 1309, and the like. In some embodiments, thedynamic cellular card 600 can interact with the POS terminal 1301 andthe contactless POS terminal 1303 as discussed above. In some instances,a user 1311 in communication with client device 1305 can use the dynamiccellular card 600 to execute e-commerce transactions using dataassociated and/or stored in the dynamic cellular card 600. In someembodiments, server 1309 can be part of a financial institution system,merchant system, online store system, or other suitable entity capableof authenticate and authorize interactions or transactions associatedwith the dynamic cellular card 600. In some embodiments, the memberdevices 1301, 1303, and 1305 may be personal computers, multiprocessorsystems, microprocessor-based or programmable consumer electronics,network PCs, and the like. In some embodiments, one or more memberdevices within member devices 1301, 1303, and 1305 may include computingdevices that typically connect using a wireless communications mediumsuch as cell phones, smart phones, pagers, walkie talkies, radiofrequency (RF) devices, infrared (IR) devices, CBs, integrated devicescombining one or more of the preceding devices, or virtually any mobilecomputing device, and the like. In some embodiments, one or more memberdevices within member devices 1301, 1303, and 1305 may be devices thatare capable of connecting using a wired or wireless communication mediumsuch as, wearable computer, a laptop, tablet, desktop computer, anetbook, a video game device, a pager, a smart phone, an ultra-mobilepersonal computer (UMPC), and/or any other device that is equipped tocommunicate over a wired and/or wireless communication medium. In someembodiments, one or more member devices within member devices 1301,1303, and 1305 may run one or more applications, such as Internetbrowsers, mobile applications, voice calls, video games,videoconferencing, and email, among others. In some embodiments, one ormore member devices within member devices 1301, 1303, and 1305 may beconfigured to receive and to send web pages, and the like. In someembodiments, a browser application of the present disclosure may beconfigured to receive and display graphics, text, multimedia, and thelike, employing virtually any web based language, including, but notlimited to Standard Generalized Markup Language (SMGL), such asHyperText Markup Language (HTML), a wireless application protocol (WAP),a Handheld Device Markup Language (HDML), such as Wireless MarkupLanguage (WML), WMLScript, XML, JavaScript, and the like. In someembodiments, a member device within member devices 1301, 1303, and 1305may be specifically programmed by either Java, .Net, QT, C, C++ and/orother suitable programming language. In some embodiments, one or moremember devices within member devices 1301, 1303, and 1305 may bespecifically programmed to include or execute an application to performa variety of possible tasks, such as, without limitation, messagingfunctionality, browsing, searching, playing, streaming or displayingvarious forms of content, including locally stored or uploaded messages,images and/or video.

In some embodiments, the network 1307 may provide network access, datatransport and/or other services to any computing device coupled to it.In some embodiments, the network 1307 may include and implement at leastone specialized network architecture that may be based at least in parton one or more standards set by, for example, without limitation, GlobalSystem for Mobile communication (GSM) Association, the InternetEngineering Task Force (IETF), and the Worldwide Interoperability forMicrowave Access (WiMAX) forum. In some embodiments, the network 1307may implement one or more of a GSM architecture, a General Packet RadioService (GPRS) architecture, a Universal Mobile TelecommunicationsSystem (UMTS) architecture, and an evolution of UMTS referred to as LongTerm Evolution (LTE). In some embodiments, the network 1307 may includeand implement, as an alternative or in conjunction with one or more ofthe above, a WiMAX architecture defined by the WiMAX forum. In someembodiments and, optionally, in combination of any embodiment describedabove or below, the network 1307 may also include, for instance, atleast one of a local area network (LAN), a wide area network (WAN), theInternet, a virtual LAN (VLAN), an enterprise LAN, a layer 3 virtualprivate network (VPN), an enterprise IP network, or any combinationthereof. In some embodiments and, optionally, in combination of anyembodiment described above or below, at least one computer networkcommunication over the network 1307 may be transmitted based at least inpart on one of more communication modes such as but not limited to:Near-Field Communication (NFC), Radio Frequency Identification (RFID),Narrow Band Internet of Things (NBIOT), ZigBee, 3G, 4G, 5G, GlobalSystem for Mobile Communications (GSM), General Packet Radio Service(GPRS), WiFi, WiMax, Code Division Multi-access (CDMA), and anycombination thereof. In some embodiments, the network 1007 may alsoinclude mass storage, such as Network Attached Storage (NAS), a StorageArea Network (SAN), a Content Delivery Network (CDN) or other forms ofcomputer or machine-readable media.

In some embodiments, the server 1309 may be, for example, a web server(or a series of servers) running a network operating system. In someembodiments, the server 1309 may be used for and/or provide cloud and/ornetwork computing. Although not shown in FIG. 13, in some embodiments,the server 1309 may have connections to external systems like email, SMSmessaging, text messaging, ad content providers, etc. [94] In someembodiments, the server 1309 may be specifically programmed to perform,in non-limiting example, as authentication servers, search servers,email servers, social networking services servers,financial/banking-related services servers, travel services servers, orany similarly suitable service-base servers for users of the membercomputing devices 1301, 1303, and 1305. [95] In some embodiments and,optionally, in combination of any embodiment described above or below,for example, one or more computing member devices 1301, 1303, and 1305,the server 1309, may include a specifically programmed software modulethat may be configured to send, process, and receive information using ascripting language, a remote procedure call, an email, a tweet, ShortMessage Service (SMS), Multimedia Message Service (MMS), InstantMessaging (IM), Internet Relay Chat (IRC), mIRC, Jabber, an applicationprogramming interface, Simple Object Access Protocol (SOAP) methods,Common Object Request Broker Architecture (CORBA), Hypertext TransferProtocol (HTTP), Representational State Transfer (REST), or anycombination thereof.

FIG. 14 is an example of interactions between a dynamic cellular cardand a computing device, in accordance with one or more embodiments ofthe present disclosure.

Typically, a static 4-digit CID value that printed on a payment card isentered by a user or cardholder and sent online to an authorization hostas proof that the user has the physical card. When this value iscompromised, a third party seeking to perpetrate fraud only needs thisvalue and other visible card data to complete an online transaction.

In some embodiments, a payment card with an electronic display canobtain a newly generated dCID value from a host and can display this new(dynamic) CID value on the card thus reducing the vulnerability ofonline fraud associated with the account associated with that card.

Initially, a host can generate the 4-digit dCID (normally printed on theface of the card) and passes this value on to a personalization bureau.The personalization bureau downloads this value to the paymentapplication on the card. The payment application sends this value to thecard's display as the initial dCID value for use in “card-not-present”transactions.

When the card is compromised and a contact authorization transaction issubmitted, the host will generate issuer scripts and embed a newencrypted dCID value for the card to display. The payment card willreceive the new encrypted dCID value in the issuer scripts and willdecrypt the new dCID and send it to the card's electronic display. Thisnew value may now be used a user to perform transactions where a card isnot physically present such as online transactions.

For example, as shown in FIG. 14, in some instances, a dynamic cellularcard can be associated with a first temporary identification card number1409A. The card 1400 can be inserted into a computing device, forexample, POS terminal 1403. The POS terminal 1403 can send anauthorization message 1405 to the authorization host server 1407. Insome instances, the authorization host server 1407 can send anauthorization response 1411 with a set of new encrypted identificationcard numbers. The card 1400 can receive the authorization response 1411with the set of new encrypted identification card numbers. Thereafter,the card 1400 can select and decrypt an encrypted identification cardnumber from the set of new encrypted identification card numbers toproduce a second temporary identification card number. The secondtemporary identification card number 1409B can be rendered on the card1400 and used in a subsequent interaction with a different computingdevice.

Typically, re-issuance of a card is required when account numbersassociated with the card are compromised. Reissuing a card requiresamong other things, system account updates, sending a new request for anew card to a personalization bureau, generation of a new card, andshipping of the new card to a user. In some embodiments of the presentdisclosure, instead of physically issuing a new card, the numbers on thecard can be re-programmed remotely and effectively replace the oldaccount with a new card without having to create a new physical card.All or part of account data including numbers on a dynamic cellularcard, including but not limited to, the primary account number (“PAN”),4-digit CID, 3-digit card security code (“CSC”), and expiration date ofthe card, can be displayed on programmable electronic paper.Re-programming of the card may be performed by the authorization hostfollowing a contact transaction by the card at a certified POS terminal.

FIG. 15 is an example of interactions between a dynamic cellular cardand a computing device, in accordance with one or more embodiments ofthe present disclosure.

In some instances, the dynamic cellular card can be associated withseveral first temporary card account numbers that are written onelectronic programmable paper (e-paper) on the dynamic cellular card.For example, the expiration date on dynamic cellular card 1521 can be afirst temporary account number. The primary account number (“PAN”) 1517can be another temporary account number. The 4-digit CID 1525 can alsobe a temporary account number. The 3-digit card security code (“CSC”)1526 on the back of the dynamic cellular card may also be a temporaryaccount number. Initially, the expiration date of the dynamic cellularcard, PAN, CID, and CSC values can be downloaded to a paymentapplication on a chip on the dynamic cellular card and then displayed.Dynamic cellular card 1500 may contain a chip, but may not possess amagnetic stripe. Dynamic cellular card 1500 may or may not possess aninternal battery source.

When the account is compromised, the cardholder can perform a contacttransaction at a host certified POS, and in response, the host cangenerate and send encrypted new account data to the dynamic cellularcard to populate the e-paper with the new values. The account data onthe chip can also be reprogrammed in the same transaction.

For example, as shown in FIG. 16, when the account is compromised,dynamic cellular card 1600 can be inserted into a computing device suchas POS terminal 1603. POS terminal 1603 can send an authorizationmessage 1605 to the authorization host server 1607. In some instances,the authorization host server 1607 can send an authorization response1611 with a set of new encrypted card account numbers including a new4-digit CID number 1609A. Other card account numbers that may besimilarly transmitted include a new 3-digit CSC; a new expiration datefor the dynamic cellular card; and a new PAN. Dynamic cellular card 1500can receive the authorization response 1611 comprising the set of newencrypted dynamic cellular card account numbers including the new4-digit CID number, the new 3-digit CSC; the new expiration date; and anew PAN. Thereafter, dynamic cellular card 1500 can select and decryptthe new dynamic cellular card account numbers from the set of newencrypted dynamic cellular card account numbers to produce secondtemporary dynamic cellular card account numbers. The second temporarydynamic cellular card account numbers can be rendered on dynamiccellular card 1500 and used in a subsequent interaction with a differentcomputing device.

The advantages of this remote re-issuance dynamic cellular card includeelimination of the need to physically reissue a card with a compromisedaccount and elimination of the cost associated with such reissuance.Based on this remote re-issuance dynamic cellular card, cards may bereissued faster. Further, since dynamic cellular cards may bereprogrammed by an authorization host on demand, acquiring static cardaccount data may lose value for bad actors interested in fraudulentlyacquiring and using such data and thereby reduce or prevent fraud.

FIGS. 17 through 22 illustrate systems and methods for afingerprint-enabled cellular card. The following embodiments providetechnical solutions and/or technical improvements that overcometechnical problems, drawbacks and/or deficiencies in the technical fieldof fingerprint-enabled cellular cards. As explained in more detail,below, technical solutions and/or technical improvements herein includeaspects of improved cards resilient to fraudulent use.

FIG. 17 illustrates an example of a fingerprint-enabled cellular card,in accordance with one or more embodiments of the present disclosure. Insome embodiments, the fingerprint-enabled cellular card can include acommunication bus 1701, a processor 1703, a visual indicator 1705, asmart card chip 1707, a fingerprint sensor 1709, a non-transitory memory1711, a contactless antenna 1713, and a network communication interface1715. In some embodiments, the visual indicator may be a display.

In some embodiments, the fingerprint-enabled cellular card is without aninternal power source. By way of example, and in some embodiments, amethod of using the fingerprint-enabled cellular card is to introducethe card to an external source of power. Once the card acquires powerfrom the external source of power, a card holder may place a finger onfingerprint sensor 1709. The fingerprint sensor obtains and sends thefingerprint scan to the processor 1703 for processing that may includestoring the fingerprint scan in non-transitory memory 1711 as a firstfingerprint sample. The processor may also determine if the scan is asecond fingerprint sample and determine if the second fingerprint sampleis a match to the first fingerprint sample already stored innon-transitory memory 1711.

In some embodiments, communication bus 1701 may be a physical interfacefor interconnecting the various components of the card. However, in someembodiments, the communication bus 1701 may be a network interface,chipset buses, switch, or other communication interface.

In some embodiments, a fingerprint-enabled cellular card 1700 mayinclude a fingerprint sensor 1709 configured to read, receive and send acard holder's fingerprint to the processor 1707.

In some embodiments, a fingerprint-enabled cellular card 1700 mayinclude a processor 1707 operable to perform instructions when receivingpower from an external source. For example, the external source forpower may be a computing device not shown in FIG. 17. One set ofinstructions for the processor 1707 may be receiving and storing innon-transitory memory 1711 a fingerprint sample of a card holderobtained using fingerprint sensor 1709. In some embodiments, thefingerprint sensor 1709 can be a light-based optical sensor that take anoptical image of a fingerprint sample and detects unique patterns on thesurface of the fingerprint sample, such as ridges or unique marks, byanalyzing lightest and darkest areas of the fingerprint sample. In someother embodiments, the fingerprint sensor 1709 can be a capacitivesensor that uses electricity to determine fingerprint patterns. As afinger rests on the surface of the fingerprint sensor 1709, the sensormeasures a charge using ridges to exhibit a change in capacitance, whilevalleys on a fingerprint sample produce insignificant or no charge atall. A capacitive fingerprint sensor can use collected capacitance datato accurately detect fingerprints. In yet some other embodiments, thefingerprint sensor 1709 can be an ultrasonic sensor designed to emitultrasonic pulses and measure how much such pulses bounces back when afingerprint sample is placed on the surface of the sensor andaccordingly detect a fingerprint sample.

In some embodiments, non-transitory memory 1711 may include any type ofcomputer memory that retains data for an extended time, regardless ofwhether the fingerprint-enabled cellular card is powered on or off. Forinstance, the non-transitory memory can store a first fingerprintsample.

In some embodiments, a fingerprint-enabled cellular card 1700 mayinclude light emitting diode or plural light-emitting diodes 1706 asseen in FIG. 18. The light-emitting diodes may be used instead of avisual indicator 1705. The light emitting diodes and/or the visualindicator may indicate a match of a second sample fingerprint to a firstsample fingerprint. In some embodiments, a match can be determined basedon a fingerprint analysis that can include plotting fingerprint samplepoints where fingerprint ridges end abruptly and fork into two branches.Likewise, orientation of fingerprint patterns such as, arches, loops,and whorls can be used in a matching process.

In some embodiments, if a first colored light, for example green, isdisplayed by the-light emitting diodes, the processor has determinedthat there was a match between a set of first and second samplefingerprints. However, if a second colored light, for example red, isdisplayed by the light emitting diode, the processor has determined thatthere was not a match between the set of first and second samplefingerprints.

In some embodiments, contactless antenna 1713 can include a RadioFrequency Identification (RFID) system, a Near Field Communication (NFC)system or other suitable system that enables the fingerprint-enabledcellular card 1700 to transmit data to other computing devices in acontactless interaction. In some implementations, the contactlessantenna 1713 can receive electromagnetic waves (e.g., by radio frequencyinduction) from a computing device, and the electromagnetic waves canpower up the fingerprint-enabled cellular card 1700. In some instances,the fingerprint-enabled cellular card 1700 can be powered up via thecontactless antenna 1713 and thereafter, scan a second fingerprintsample and compare that sample to a first fingerprint sample stored innon-transitory memory 1711. The fingerprint-enabled cellular card 1700can determine if there is a fingerprint match between a set of first andsecond sample fingerprints and display the results of a match or lack ofa match with the visual indicator 1705. In some of embodiments, theprocessor's determination of a fingerprint match or not can be displayedby light emitting diodes 1706.

In some embodiments, the smart card chip 1707 can provide thefingerprint-enabled cellular card 1700 with electrical connectivity toan external power source when inserted into a computing device. In someinstances, upon insertion into a computing device, thefingerprint-enabled cellular card 1700 sends and receives informationfrom the computing device and/or a server in communication with thecomputing device. In some instances, the fingerprint-enabled cellularcard can determine if there is a fingerprint match between a set offirst and second sample fingerprints.

FIG. 18 schematically illustrates an example of the fingerprint-enabledcellular card 1700, in accordance with one or more embodiments of thepresent disclosure. In some implementations, the fingerprint-enabledcellular card may be a card that is associated with the card holder. Inthis example, permanent identification card number shown at 1717, thecard holder's name shown at 1719, and expiration date shown at 1721 mayall be a part of the fingerprint-enabled cellular card 1700.

FIG. 19 illustrates an example of a card coupler 1923, in accordancewith some embodiments of the present disclosure as further describedbelow. In some implementations, card coupler 1923 initiates a firstpower transfer to a fingerprint-enabled cellular card 1900. After thepower transfer, the processor may obtain a first fingerprint sample fromthe fingerprint sensor and send the sample to non-transitory memory1711. In some instances, the fingerprint-enabled cellular card 1900needs to be inserted into the card coupler 1923 to receive the powertransfer. In some instances, the card holder will place a finger on thefingerprint sensor a plurality of times, such that thefingerprint-enabled cellular card may obtain a plurality of fingerprintdata and images to build the first fingerprint sample.

FIG. 20 illustrates an example of a flow diagram 2000 of animplementation of a fingerprint-enabled cellular card 1700, inaccordance to some embodiments of the present disclosure. As shown inFIG. 20, at step 2001, the fingerprint-enabled cellular card is poweredby an external power source for the first interaction. In someembodiments, the fingerprint sensor gathers fingerprint data and imagesof the card holder as shown in step 2003. In step 2005, the processorstores in non-transitory memory a first fingerprint sample obtained bythe fingerprint sensor. The fingerprint-enabled cellular card is removedfrom external power source and ready to use for a future interaction,perhaps a transaction, as shown in step 2007. In step 2009, thefingerprint-enabled cellular card is powered by a computing device at apoint of sale for a transaction. At the transaction, the card holderwill place a finger on the finger sensor for the processor to gather asecond fingerprint sample as shown in step 2011.

Continuing with the flow diagram 2000 of FIG. 20, as shown in step 2013,the processor compares the first fingerprint sample from the memory withthe second fingerprint sample. In step 2015, the processor determineswhether there is a match of the fingerprint samples. If there is amatch, the processor of the fingerprint-enabled cellular card determinesthe transaction is authorized and may allow the transaction to proceedas shown in step 2017. If there is not a match of fingerprint samples,the processor of the fingerprint-enabled cellular card determines thetransaction is not authorized and may disallow the transaction toproceed in step 2019. Optionally, if there was no fingerprint match, theprocessor of the fingerprint-enabled cellular card may start anauthentication method of a standard pin with smart card chip 1707.

In some embodiments of the present disclosure, a first fingerprintsample of a card holder may be loaded in the non-transitory memory ofthe fingerprint-enabled cellular card before the card holder obtains thefingerprint-enabled cellular card. For example, computing device andnon-transitory memory may have a first fingerprint of the card holderfrom an issuing institution and the issuing institution may load thatfingerprint sample onto the non-transitory memory of thefingerprint-enabled cellular card before releasing thefingerprint-enabled cellular card to the card holder.

FIG. 21 is an example of interactions between the fingerprint-enabledcellular card and a computing device, in accordance with one or moreembodiments of the present disclosure. The fingerprint-enabled cellularcard 1700 can be inserted 2105 into a computing device, for example, POSterminal 2103. The POS terminal 2103 is operable to power up thefingerprint-enabled cellular card. The card holder places a finger onthe finger sensor, allowing the fingerprint-enabled cellular card todetermine if the second fingerprint sample is a match to the firstfingerprint sample. If the processor of the fingerprint-enabled cellularcard determines a fingerprint match, authentication is done and thefingerprint-enabled cellular card 1700 may communicate with POS terminal2103 to allow the transaction. If the processor of thefingerprint-enabled cellular card determines there is no fingerprintmatch, authentication is not done and the processor of thefingerprint-enabled cellular card 1700 may communicate with POS terminal2103 to disallow the transaction. In some embodiments, if thefingerprint samples are not a match, the processor of thefingerprint-enabled cellular card may communicate with the POS terminalto continue authentication with a standard pin and smart chip 107authentication method to perhaps result in a different successfulauthentication process.

FIG. 22 is an example of a contactless interaction between thefingerprint-enabled cellular card and a computing device, in accordancewith one or more embodiments of the present disclosure. In someinstances, the fingerprint-enabled cellular card 1700 can be placed neara computing device, for example, contactless POS terminal 2201. Thecontactless POS terminal 2201 can emit electromagnetic waves or RFIDsignals 2207 received by the fingerprint-enabled cellular card 1700.

The fingerprint-enabled cellular card 1700 may use the electromagneticwaves to power up and the card holder may place a finger on the fingersensor so the processor of the fingerprint-enabled cellular card candetermine if this second fingerprint sample is a match to the firstfingerprint sample. If the processor determines a fingerprint match,authentication is done and processor 1703 of the fingerprint-enabledcellular card 1700 may communicate with contactless POS terminal 2201 toallow the transaction. In some embodiments, an authentication processcan be a process that includes detecting a match between a firstfingerprint sample stored in the non-transient memory and a secondfingerprint sample taken from the surface of the fingerprint sensor1709. If the processor of the fingerprint-enabled cellular carddetermines there is no fingerprint match, authentication is not done andthe processor of the fingerprint-enabled cellular card may communicatewith contactless POS terminal 2201 to disallow the transaction. In someembodiments, if the fingerprints are not a match, thefingerprint-enabled cellular card may communicate with the contactlessPOS terminal to continue with a standard pin and smart chip 1707authentication.

In some embodiments, the fingerprint-enabled cellular card 1700comprises a processor 1703; a fingerprint sensor 1709; a light-emittingdiode 1706; and a non-transitory memory 1711 and storing instructions.The storing instructions when executed by the processor, cause theprocessor to power up the fingerprint-enabled cellular card uponreceiving power from an external power source housed within a computingdevice during at least one interaction between the fingerprint-enabledcellular card and the computing device. The fingerprint-enabled cellularcard lacks an internal power source, and when the fingerprint-enabledcellular card is powered up, the processor is further configured todetect a first fingerprint sample via the fingerprint sensor. The firstfingerprint sample is associated with a user of the fingerprint-enabledcellular card and the processor initiates an authentication process ofthe first fingerprint sample before a transaction event. Theauthentication process is based on a match between the first fingerprintsample stored in the non-transitory memory and a second fingerprintsample. The fingerprint-enabled cellular card emits a first light colorvia the light-emitting diode upon a determination that the firstfingerprint sample matches the second fingerprint sample and allows thetransaction event. The fingerprint-enabled cellular card emits a lightof a second light color via the light-emitting diode upon adetermination that the first fingerprint sample does not match thesecond fingerprint sample and disallows the transaction event.

In some embodiments, the fingerprint-enabled cellular card 1700 may bepaired with a card holder's device (not shown), for example a smartphone. The pairing between the fingerprint-enabled cellular card 1700and card holder's device may be accomplished with Bluetooth Low Energy(BLE) protocols. The card holder's device may have a mobile walletapplication for example American Express mobile wallet. Thefingerprint-enabled cellular card may be in constant communication withthe card holder's device. For example, the fingerprint-enabled cellularcard may ‘ping” a mobile wallet app of the card holder's device. A cardholder's device and the fingerprint-enabled cellular card may beoperable to detect a location of the other.

In some embodiments, both the fingerprint-enabled cellular card and thecard holder's device are operable to determine when the proximity toeach other is greater than one specified distance. Optionally, if thefingerprint-enabled cellular card and the card holder's device aregreater than the one specified distance, the fingerprint-enabledcellular card and/or the card holder's device may alert the card holder.In some embodiments, this alert can be done with LED lights or piezospeakers.

In some embodiments, when the proximity between the fingerprint-enabledcellular card and the card holder's device locations are such that theyare no longer able to detect each other, the fingerprint-enabledcellular card and/or the card holder's device may be operable todeactivate the payment capabilities. Optionally, the card and/or thecard holder's device may be operable to reactivate the paymentcapabilities when their proximity to each other are close enough todetect the other again.

FIG. 23 illustrates systems and methods for a fingerprint-enabledcellular card with Blue Tooth Low Energy account registration, inaccordance with one or more embodiments of the present disclosure. Afingerprint-enabled cellular card with Blue Tooth Low Energy accountregistration system can comprise a payment card with a fingerprintsensor, and Blue Tooth enabled card coupler.

As shown in FIG. 23, a card coupler 1923 and a fingerprint-enabledcellular card 1700 comprising a fingerprint sensor 1709 are provided toa user. Card coupler 1923 is equipped with an antenna such as a bluetooth antenna 2301 and may be battery powered or powered by an externalsource. For example, card coupler 1923 may be powered by computingdevice such as mobile phone or a PC and connected by a cable or by acoin cell type battery on the coupler. Card coupler 1923 may communicatewith communication devices such as a mobile communication device orstandalone computer based on Bluetooth capability. The card coupler canbe reusable or can self-destruct making it a one-time use device.

Fingerprint-enabled cellular card 1700 is equipped with a fingerprintsensor 1709 and optionally a light emitting diode sensor 1706. Anaccompanying software application can provide instructions to a user onhow a user can register the user's fingerprint on fingerprint sensor1709 of fingerprint-enabled cellular card 1700.

As shown in FIG. 23, a user can insert fingerprint-enabled cellular card1700 into card coupler 1923. The user places the user's finger onfingerprint sensor 1709 and presses their finger on the sensor at leastone time until the proper finger-print template is created and stored onthe fingerprint-enabled cellular card. The data template that describesthe user's unique fingerprint never leaves the card. Instead, when theuser initializes their fingerprint-enabled cellular card with theirfinger print, success or failure of the initialization can betransmitted to a software registration application on a computing deviceusing Blue Tooth communication protocol. For example, card coupler 1923communicates with an application on a mobile communication device orother communication device via Bluetooth 2301 and communicates whetherthe fingerprint has been successfully authenticated or not to theapplet/website via BLE (Bluetooth Low Energy). The applet/website inturn can inform the host that the fingerprint-enabled cellular card isactive and fingerprint capable.

An advantage of a fingerprint-enabled cellular card with Blue Tooth LowEnergy account registration system is that it permits complete cardactivation and registration of a user's fingerprint to be completed inone secure step. In one transaction, an unactivated fingerprint-enabledcellular card can send its account data and its registration status to aweb application before the fingerprint-enabled cellular card isactivated.

Another advantage of a fingerprint-enabled cellular card with Blue ToothLow Energy (“BLE”) account registration system is that it allowsbiometric cardholder authorization at POS and in “card-not-present”transactions. A BLE registration method allows the user's fingerprintdata to stay on the fingerprint-enabled card. The user's fingerprintdata does not have to be pulled from another source (such as from afingerprint template on a user's mobile phone). Further, afingerprint-enabled cellular card can communicate with the authorizationhost network at the time of account setup permitting the possibility ofother network to card communication in the privacy of a user's home.

FIG. 24 illustrates systems and methods for an electronic-commercecoupler, in accordance with one or more embodiments of the presentdisclosure. As illustrated in FIG. 24, a coupler 2401 and afingerprint-enabled cellular card 1700 are provided to a user. Thecoupler can be a low cost certified smart card reader. The coupler canbe powered by a user's computing device or other power source. Thecoupler 2401 can be connected to the power source by a cable.

The coupler 2401 comprises software that communicates with a chip onfingerprint-enabled cellular card 1700. For example, thefingerprint-enabled cellular card 1700 may have an EMV certified kernel(EMV software that communicates with an EMV chip) which can be dedicatedto perform a host contact transaction such that the fingerprint-enabledcellular card 1700 does not have to be present for a an authorizationhost message. The software application can either be a separate chip onthe coupler or a program in the chip itself. The coupler 2401 can becertified to comply with various contact and contactless certificationssuch as EMV certifications and can also interface with a merchantpayment application on a merchant website (mobile app).

When the fingerprint-enabled cellular card 1700 is inserted into thecoupler 2401 or placed near the coupler 2401, the coupler communicateswith the fingerprint-enabled cellular card and with a paymentapplication on the merchant's website which in turn transmits anauthorization message to the host. The host receives card data such asthe one-time cryptogram, and cardholder verification results (such asoffline PIN). The cardholder's fingerprint-enabled cellular card datamay now be safely transmitted to the authorization host as though theFingerprint-enabled cellular card is physically present at the merchantsite.

Advantages of an electronic-commerce coupler system includes providingsecurity of the in-store merchant POS to a user's computing device, andinterfacing with the merchant's online store to greatly reduce fraud foronline transactions. The software application that normally resides onthe merchant's POS terminal may reside on the card itself and thetransaction effectively becomes a “card present” transaction instead of“card not present” transaction. Transactions that use the e-commercecoupler can provide a user with ease of mind that the user's onlinepayments are secured by EMV chip technology.

In accordance with one or more embodiments of the present disclosure,FIGS. 25-28 illustrate systems and methods for a dynamicfingerprint-enabled cellular card and a programmable dynamic CID.

A dynamic fingerprint-enabled cellular card with a fingerprint sensorand a programmable dynamic CID comprises at least a Fingerprint-enabledcellular card with a fingerprint sensor; a coupler with Bluetooth energycapabilities; a programmable digital CID; and a wallet or application ona computing device that allows a user to change the 4-digit CID (dCID)value on the user's fingerprint-enabled cellular card to a new value ofthe user's choice using bluetooth energy protocol.

Fingerprint authentication is required to change the dCID value.Fingerprint authentication may be obtained by any of the embodimentsdisclosed herein. The software application on the computing device canupdate the new dCID value. The dCID value may also be programmed toremain unchanged or changeable by authorization host.

By authenticating their fingerprint on their card, and through the useof blue tooth energy technologies in association with a coupler, a usercan choose their own unique 4-digit CID value and can program/populatetheir own unique 4-digit CID value using a wallet/app via Bluetoothprotocol.

Fingerprint authentication may be obtained in several ways. For example,as shown in FIG. 25, a card coupler 1923 is provided to a user. Cardcoupler 1923 is equipped with an antenna such as a blue tooth antenna2501 and may be battery powered or powered by an external source. Cardcoupler 1923 may communicate with communication devices such as a mobilecommunication device or standalone computer based on Bluetoothcapability.

Fingerprint-enabled cellular card 1700 is equipped with a fingerprintsensor 1709 and optionally a light emitting diode sensor 1706. A usercan insert fingerprint-enabled cellular card 1700 into card coupler1923. The user places their finger on fingerprint sensor 1709 at leastone time. Card coupler 1923 communicates with an application on a mobilecommunication device or other communication device via Bluetooth andindicates whether the fingerprint has been successfully authenticated ornot.

Alternatively, as shown in FIG. 26, a user presents fingerprint-enabledcellular card 1700 to POS terminal 2601 with their finger on fingerprintsensor 1709. The RF field from POS terminal 2601 provides power tofingerprint-enabled cellular card 1700 or to fingerprint sensor 1709.Card 1700 authenticates fingerprint as described in embodimentsdescribed herein, illuminates a green LED, and informs POS terminal 2601that the cardholder has been verified. When the cardholder isauthenticated, the POS terminal 2601 or fingerprint-enabled cellularcard 1700 completes the contactless transaction without furthercardholder verification.

As shown in FIG. 27, a dynamic 4-digit CID value can be initiallyobtained using similar processes as described in various embodimentsdescribed herein. As shown in FIG. 28, using wallet/software applicationvia Blue Tooth protocol on a computing device, a user can change thedCID value on fingerprint-enabled cellular card 1700 after providingfingerprint authentication. For example, a user can press their fingeron card 1700 to authenticate their fingerprint. Once the fingerprint isauthenticated, a software application on mobile device allows the userto change the dCID to the value of their choice via BLE protocol. Thesoftware application updates the new value. As discussed above, the dCIDmay be programmed to remain unchanged or be dynamic (changeable byhost).

An advantage of a Blue Tooth enabled, dynamic fingerprint-enabledcellular card with a fingerprint sensor and a programmable dynamic CIDis that a user can obtain additional ownership and personalization ofthe user's dynamic fingerprint-enabled cellular card by choosing theirown 4-digit CID value that is easy to memorize and thus enter quicklyinto “card-not-present” transactions.

FIG. 29 illustrates apparatus and methods for a fingerprint-enableddigital display cellular card, in accordance with one or moreembodiments of the present disclosure.

Typically, a payment card can have sensitive account data staticallyprinted or embossed on the card. Such sensitive account data may includebut is not limited to: the primary account number (“PAN”) for the card;the expiration date of the card; the 4-digit card security code (“CSC”);and a 3-digit card security code, among others. In some embodiments, thepresent disclosure can display sensitive account data on a digitaldisplay on the card. The digital display can comprise anelectro-chromatic display. The digital display can be illuminated andvisible only when a user places the user's fingerprint on a fingerprintsensor on the card and the user's fingerprint has been authenticated.

As shown in FIG. 29, fingerprint-enabled digital display cellular card1700 has a fingerprint sensor 1709. Fingerprint-enabled digital displaycellular card 1700 can be powered by a thin rechargeable battery 2902. Auser can place the user's finger on the fingerprint sensor 2909 on card2900 at least once for user authentication as described in variousembodiments disclosed herein. When the user's fingerprint isauthenticated, a digital display 2903 on fingerprint-enabled digitaldisplay cellular card 1700 is powered up and displays account sensitivedata including the PAN, the expiration date of the card, the 4-digitcard CID, or the 3-digit CSC on the digital display.

An advantage of a digital display card is that it is programmable fromthe field and allows re-issuance. The Fingerprint-enabled digitaldisplay cellular card can be programmable from a remote location. Insome embodiments, the magnetic stripe on the back of a card may beprogrammable remotely using programmable electronic paper. Thefingerprint-enabled digital display cellular card may be fullyre-programmable card or can be completely terminated remotely.

Any regional information on the card including region-specific “help”data, such as regional contact information including telephone numbersfor customer service can also be programmed remotely thus making thecard region-agnostic. A card that uses a digital display according tothe present embodiment can be fully programmable, completely erasable,and completely re-issuable by a remote host. Further, afingerprint-enabled digital display cellular card can use amulti-operational system and can be region agnostic.

Throughout the specification, the following terms take the meaningsexplicitly associated herein, unless the context clearly dictatesotherwise. The phrases “in one embodiment” and “in some embodiments” asused herein do not necessarily refer to the same embodiment(s), thoughit may. Furthermore, the phrases “in another embodiment” and “in someother embodiments” as used herein do not necessarily refer to adifferent embodiment, although it may. Thus, as described below, variousembodiments may be readily combined, without departing from the scope orspirit of the present disclosure.

As used herein, the term “user” shall refer to at least one user. Insome embodiments, the term “user” should be understood to refer to aprovider of an application or applications as described herein and/or aconsumer of data supplied by a data provider. By way of example, and notlimitation, the terms “user” or “developer” can refer to a person whoreceives data provided by the data or service provider over the Internetin a browser session, or can refer to an automated software applicationwhich receives the data and stores or processes the data.

In addition, the term “based on” is not exclusive and allows for beingbased on additional factors not described, unless the context clearlydictates otherwise. In addition, throughout the specification, themeaning of “a,” “an,” and “the” include plural references. The meaningof “in” includes “in” and “on.”

It is understood that at least one aspect/functionality of variousembodiments described herein can be performed in real-time and/ordynamically. As used herein, the term “real-time” or “near real-time” isdirected to an event/action that can occur instantaneously or almostinstantaneously in time when another event/action has occurred. Forexample, the “real-time processing,” “real-time computation,” and“real-time execution” all pertain to the performance of a computationduring the actual time that the related physical process (e.g., a userinteracting with an application on a mobile device) occurs, in orderthat results of the computation can be used in guiding the physicalprocess. In some embodiments, events and/or actions in accordance withthe present disclosure can be in real-time, near real-time, and/or basedon a predetermined periodicity of at least one of: nanosecond, severalnanoseconds, millisecond, several milliseconds, second, several seconds,minute, several minutes, hourly, several hours, daily, several days,weekly, monthly, etc. As used herein, the term “dynamically” and term“automatically,” and their logical and/or linguistic relatives and/orderivatives, mean that certain events and/or actions can be triggeredand/or occur without any human intervention.

In some embodiments, programmed computing systems with associateddevices can be configured to operate in the distributed networkenvironment, communicating with one another over one or more suitabledata communication networks (e.g., the Internet) and utilizing one ormore suitable data communication protocols.

In some embodiments, the material disclosed herein may be implemented inhardware and software or firmware or a combination of them or asinstructions stored on a non-transitory machine-readable medium, whichmay be read and executed by one or more processors. A machine-readablemedium may include any medium and/or mechanism for storing ortransmitting information in a form readable by a machine (e.g., acomputing device). For example, a machine-readable medium may includeread only memory (ROM); random access memory (RAM); magnetic diskstorage media; optical storage media; flash memory devices, and others.In some embodiments, the non-transitory machine-readable medium caninclude one or more storage devices, and memory devices described above.

Examples of hardware elements may include processors, microprocessors,circuits, circuit elements (e.g., transistors, resistors, capacitors,inductors, and so forth), integrated circuits, Application SpecificIntegrated Circuits (ASIC), Programmable Logic Devices (PLD), DigitalSignal Processors (DSP), Field Programmable Gate Array (FPGA), logicgates, registers, semiconductor device, chips, microchips, chip sets,and so forth. In some embodiments, the one or more processors may beimplemented as a Complex Instruction Set Computer (CISC) or ReducedInstruction Set Computer (RISC) processors; x86 instruction setcompatible processors, multi-core, or any other microprocessor orCentral Processing Unit (CPU). In various implementations, the one ormore processors may be dual-core processor(s), dual-core mobileprocessor(s), and so forth.

Computer systems, and systems, as used herein, can include anycombination of hardware and software. Examples of software may includesoftware components, programs, applications, operating system software,firmware, software modules, routines, subroutines, functions, methods,procedures, software interfaces, Application Programming Interfaces(API), computer code, data, data variables, or any combination thereofthat can be processed by a computing device as computer-executableinstructions.

In some embodiments, one or more of computer-based systems of thepresent disclosure may include or be incorporated, partially or entirelyinto at least one Personal Computer (PC), laptop computer, tablet,portable computer, smart device (e.g., smart phone, smart tablet orsmart television), Mobile Internet Device (MID), messaging device, datacommunication device, server computer, and so forth.

As used herein, term “server” should be understood to refer to a servicepoint which provides processing, database, and communication facilities.By way of example, and not limitation, the term “server” can refer to asingle, physical processor with associated communications and datastorage and database facilities, or it can refer to a networked orclustered complex of processors and associated network and storagedevices, as well as operating software and one or more database systemsand application software that support the services provided by theserver. Cloud servers can be, for example, a collection of serversserving one or more functions of a single server.

In some embodiments, as detailed herein, one or more of thecomputer-based systems of the present disclosure may obtain, manipulate,transfer, store, transform, generate, and/or output any digital objectand/or data unit (e.g., from inside and/or outside of a particularapplication) that can be in any suitable form such as, withoutlimitation, a file, a contact, a task, an email, a message, a map, anentire application (e.g., a calculator), data points, and other suitabledata. In some embodiments, as detailed herein, one or more of thecomputer-based systems of the present disclosure may be implementedacross one or more of various computer platforms such as, but notlimited to: (1) Linux, (2) Microsoft Windows, (3) OS X (Mac OS), (4)Solaris, (5) UNIX (6) VMWare, (7) Android, (8) Java Platforms, (9) OpenWeb Platform, (10) Kubernetes or other suitable computer platforms.

In some embodiments, computer-based systems of the present disclosuremay be configured to utilize hardwired circuitry and/or hardwarecomponents that may be used in place of or in combination with softwareinstructions to implement features consistent with principles of thedisclosure. Thus, implementations consistent with principles of thedisclosure are not limited to any specific combination of hardwarecircuitry or hardware components and/or software

In some embodiments, software specifically programmed in accordance withone or more principles of the present disclosure may also be availableas a client-server software application, or as a web-enabled softwareapplication. For example, software specifically programmed in accordancewith one or more principles of the present disclosure may also beembodied as a software package installed on a hardware device.

In some embodiments, computer-based systems of the present disclosuremay be configured to handle numerous concurrent users that may be, butis not limited to, at least 100 (e.g., but not limited to, 100-999), atleast 1,000 (e.g., but not limited to, 1,000-9,999), at least 10,000(e.g., but not limited to, 10,000-99,999), at least 100,000. As usedherein, the term “user” shall have a meaning of at least one user.

The aforementioned examples are, of course, illustrative and notrestrictive.

At least some aspects of the present disclosure will now be describedwith reference to the following numbered clauses.

-   -   1. A cellular card comprising:        -   a processor;        -   at least one antenna;        -   a non-transitory memory storing instructions which, when            executed by the processor, cause the processor to power up            the cellular card upon receiving a power from an external            power source housed within a computing device;            -   wherein the cellular card lacks an internal power                source; and            -   wherein, when the cellular card is powered up, the                processor is further configured to:                -   establish, via the at least one antenna, a wireless                    communication with at least one cellular network                    tower associated with a mobile network carrier                    during at least one interaction between the card and                    the computing device;                -   provide, with the wireless communication, card                    identifying data to the mobile network carrier to                    register the card with a user mobile account;                -   receive, from the mobile network carrier, user                    mobile account data that comprises a user-associated                    private key;                -   transmit the user mobile account data to a card                    issuing entity computing device to associate the                    user mobile account with a user card account based                    at least in part on the user-associated private key;                    and                -   share the user mobile account data and user card                    account data between the mobile network carrier and                    a card issuing entity associated with the cellular                    card.    -   2. The cellular card of clause 1, wherein the card identifying        data provided to the mobile network carrier comprises        geo-location data identifying a physical location of the        cellular card.    -   3. The cellular card of clause 2, wherein the geo-location data        comprises Global Positioning System (GPS) data.    -   4. The cellular card of any clause of clauses 1-3, wherein the        external power source is a first external power source, the        computing device is a first computing device, and the cellular        card utilizes a second external power source obtained from a        second computing device during a transaction event between the        cellular card and the second computing device.    -   5. The cellular card of clause 4, wherein the transaction event        between the cellular card and the second computing device, is a        contactless transaction event.    -   6. The cellular card of clause 4, wherein the transaction event        is a purchase event and wherein the data comprises purchase data        of the purchase event, identifying an amount and at least one        purchased item.    -   7. The cellular card of any clause of clauses 1-6, wherein, when        the cellular card is powered up, the processor is further        configured to:        -   establish, via the at least one cellular network tower, a            second communication with the card issuing entity computing            device to transmit the user mobile account data to the card            issuing entity computing device.    -   8. The cellular card of any clause of clauses 1-7, wherein, when        the card is powered up, the processor is further configured to:        -   establish, via an electronic wallet application associated            with the card issuing entity and executed on another mobile            device, a second communication with the card issuing entity            computing device to transmit the user mobile account data to            the card issuing entity computing device.    -   9. The cellular card of any clause of clauses 1-8, wherein, when        the cellular card is powered up, the processor is further        configured to:        -   establish, via the computing device, a second communication            with the card issuing entity computing device to transmit            the user mobile account data to the card issuing entity            computing device.    -   10. The cellular card of any clause of clauses 1-9, wherein, the        user mobile account data comprises geo-location data identifying        a physical location of the cellular card.    -   11. A method comprising:        -   powering up, by a processor, a cellular card upon receiving            a power from an external power source housed within a            computing device;        -   wherein the cellular card lacks an internal power source;            and        -   wherein, when the cellular card is powered up:            -   establishing via at least one antenna, a wireless                communication with at least one cellular network tower                associated with a mobile network carrier during at least                one interaction between the cellular card and the                computing device;            -   providing with the wireless communication, card                identifying data to the mobile network carrier to                register the cellular card with a user mobile account;            -   receiving from the mobile network carrier, user mobile                account data that comprises a user-associated private                key;            -   transmitting the user mobile account data to a card                issuing entity computing device to associate the user                mobile account with a user card account based at least                in part on the user-associated private key; and                sharing the user mobile account data and user card                account data between the mobile network carrier and a                card issuing entity associated with the card.    -   12. The method of clause 11, wherein the card identifying data        comprises geo-location data identifying a physical location of        the cellular card.    -   13. The method of clause 12, wherein the geo-location data        comprises Global Positioning System (GPS) data.    -   14. The method of any clause of clauses 11-13, wherein the        external power source is a first external power source, the        computing device is a first computing device, and the cellular        card utilizes a second external power source obtained from a        second computing device during a transaction event between the        cellular card and the second computing device.    -   15. The method of clause 14, wherein the transaction event        between the cellular card and the second computing device, is a        contactless transaction event.    -   16. The method of clause 14, wherein the transaction event is a        purchase event and wherein the user mobile account data        comprises purchase data of the purchase event, identifying an        amount and at least one purchased item.    -   17. The method of any clause of clauses 11-16, wherein, when the        cellular card is powered up, the method further comprises:        -   establishing, by the processor, via the at least one            cellular network tower, a second communication with the card            issuing entity computing device to transmit the user mobile            account data to the card issuing entity computing device.    -   18. The method of any clause of clauses 11-16, wherein, when the        card is powered up, the method further comprises:        -   establishing, by the processor, an electronic wallet            application associated with the card issuing entity and            executed on another mobile device, a second communication            with the card issuing entity computing device to transmit            the user mobile account data to the card issuing entity            computing device.    -   19. The method of any clause of clauses 11-18, wherein, when the        cellular card is powered up, the method further comprises:        -   establishing, by the processor, via the computing device, a            second communication with the card issuing entity computing            device to transmit the user mobile account data to the card            issuing entity computing device.    -   20. A non-transitory computer readable medium comprising code        which, when executed by a processor, causes the processor to:        -   power up a cellular card upon receiving a power from an            external power source housed within a computing device;        -   wherein the cellular card lacks an internal power source;            and        -   wherein, when the cellular card is powered up, the processor            is further configured to:            -   establish, via the at least one antenna, a wireless                communication with at least one cellular network tower                associated with a mobile network carrier during at least                one interaction between the cellular card and the                computing device;            -   provide, with the wireless communication, card                identifying data to the mobile network carrier to                register the card with a user mobile account;            -   receive, from the mobile network carrier, user mobile                account data that comprises a user-associated private                key;            -   transmit the user mobile account data to a card issuing                entity computing device to associate the user mobile                account with a user card account based at least in part                on the user-associated private key; and share the user                mobile account data and user card account data between                the mobile network carrier and a card issuing entity                associated with the cellular card.

While one or more embodiments of the present disclosure have beendescribed, it is understood that these embodiments are illustrativeonly, and not restrictive, and that many modifications may becomeapparent to those of ordinary skill in the art, including that variousembodiments of the methodologies, the systems/platforms, and the devicesdescribed herein can be utilized in any combination with each other.Further still, the various steps may be carried out in any desired order(and any desired steps may be added and/or any desired steps may beeliminated).

1-20. (canceled)
 21. A method comprising: associating, at a server, aprivate key corresponding to a user mobile account of a mobile networkcarrier with a user card account of a card issuing entity; receiving, atthe server and from a point of sale (POS) terminal, an authorizationrequest corresponding to a cellular communication device, wherein theauthorization request includes the private key as provided to the POSterminal by the cellular communication device; determining, by theserver, that the private key included in the authorization requestcorresponds to the user card account; and in response to thedetermining, transmitting, from the server to the POS terminal, anauthorization message authorizing a transaction between the cellularcommunication device and the POS terminal.
 22. The method of claim 21,further comprising: transmitting, from the server to the cellularcommunication device, one or more card identification numbers to bedisplayed on the cellular communication device.
 23. The method of claim22, wherein the transmitting further comprises: transmitting the one ormore card identification numbers from the server to the POS terminal fordelivery to the cellular communication device.
 24. The method of claim22, further comprising: receiving, by the server, the one or more cardidentification numbers from a second POS terminal when the cellularcommunication device attempts a transaction with the second POSterminal.
 25. The method of claim 22, further comprising: receiving, bythe server, the one or more card identification numbers from a webpageserver when the cellular communication device attempts an electronictransaction with a merchant webpage.
 26. The method of claim 21, furthercomprising: receiving, from the cellular communication device, theprivate key via an electronic wallet application.
 27. The method ofclaim 21, further comprising: establishing, by the server and with amobile network carrier system corresponding to the mobile networkcarrier, bi-directional communications; and receiving, by the server andfrom the mobile network carrier system, a message indicating that thecellular communication device is in use when interacting with the POSterminal.
 28. A system, comprising: a memory; and at least one processorcoupled to the memory and configured to: associate a private keycorresponding to a user mobile account of a mobile network carrier witha user card account of a card issuing entity; receive, from a point ofsale (POS) terminal, an authorization request corresponding to acellular communication device, wherein the authorization requestincludes the private key as provided to the POS terminal by the cellularcommunication device; determine that the private key included in theauthorization request corresponds to the user card account; and inresponse to the determining, transmit, to the POS terminal, anauthorization message authorizing a transaction between the cellularcommunication device and the POS terminal.
 29. The system of claim 28,wherein the at least one processor is further configured to: transmit,to the cellular communication device, one or more card identificationnumbers to be displayed on the cellular communication device.
 30. Thesystem of claim 29, wherein to transmit the one or more caridentification numbers, the at least one processor is further configuredto: transmit the one or more card identification numbers to the POSterminal for delivery to the cellular communication device.
 31. Thesystem of claim 29, wherein the at least one processor is furtherconfigured to: receive the one or more card identification numbers froma second POS terminal when the cellular communication device attempts atransaction with the second POS terminal.
 32. The system of claim 29,wherein the at least one processor is further configured to: receive theone or more card identification numbers from a webpage server when thecellular communication device attempts an electronic transaction with amerchant webpage.
 33. The system of claim 28, wherein the at least oneprocessor is further configured to: receive, from the cellularcommunication device, the private key via an electronic walletapplication.
 34. The system of claim 28, wherein the at least oneprocessor is further configured to: establish bi-directionalcommunications with a mobile network carrier system corresponding to themobile network carrier; and receive, from the mobile network carriersystem, a message indicating that the cellular communication device isin use when interacting with the POS terminal.
 35. A non-transitorycomputer-readable device having instructions stored thereon that, whenexecuted by at least one computing device, cause the at least onecomputing device to perform operations comprising: associating a privatekey corresponding to a user mobile account of a mobile network carrierwith a user card account of a card issuing entity; receiving, from apoint of sale (POS) terminal, an authorization request corresponding toa cellular communication device, wherein the authorization requestincludes the private key as provided to the POS terminal by the cellularcommunication device; determining, that the private key included in theauthorization request corresponds to the user card account; and inresponse to the determining, transmitting, to the POS terminal, anauthorization message authorizing a transaction between the cellularcommunication device and the POS terminal.
 36. The non-transitorycomputer-readable device of claim 35, the operations further comprising:transmitting, to the cellular communication device, one or more cardidentification numbers to be displayed on the cellular communicationdevice.
 37. The non-transitory computer-readable device of claim 36,wherein the transmitting further comprises: transmitting the one or morecard identification numbers from the server to the POS terminal fordelivery to the cellular communication device.
 38. The non-transitorycomputer-readable device of claim 36, the operations further comprising:receiving, by the server, the one or more card identification numbersfrom a second POS terminal when the cellular communication deviceattempts a transaction with the second POS terminal.
 39. Thenon-transitory computer-readable device of claim 36, the operationsfurther comprising: receiving, by the server, the one or more cardidentification numbers from a webpage server when the cellularcommunication device attempts an electronic transaction with a merchantwebpage.
 40. The non-transitory computer-readable device of claim 35,the operations further comprising: establishing, by the server and witha mobile network carrier system corresponding to the mobile networkcarrier, bi-directional communications; and receiving, by the server andfrom the mobile network carrier system, a message indicating that thecellular communication device is in use when interacting with the POSterminal.