Smart chip card with fraud alert and biometric reset

ABSTRACT

The disclosure generally describes computer-implemented methods, software, and systems, including a method for placing a card into an alert state. An alert detection indication is received during an attempted data exchange using a permanent account number (PAN) associated with a card. The alert detection indication is received by an electronic controller embedded in the card and is received through an interface. The alert detection indication indicates that the PAN has an alert state identified for the PAN by an entity that issued the card. An operational mode of the card is modified into the alert state by the electronic controller and is based on receipt of the alert detection indication. An electronic display indicating that the card is in the alert state is displayed by the electronic controller.

BACKGROUND

The present disclosure relates to fraud protection for consumer cardssuch as credit cards.

Cards, such as credit cards and debit cards, can be used by cardholdersduring electronic transactions. Fraud can sometimes be detected foraccounts that are associated with the cards.

SUMMARY

The disclosure generally describes computer-implemented methods,software, and systems for locking and unlocking a card.

For example, a system for locking a card, such as an electronic card,can include an electronic controller embedded in the card and operableto: receive, via an interface when the card is in a useable state, analert detection indication during an attempted data exchange using aprimary (or permanent) account number (PAN) associated with the card,wherein the alert detection indication includes an indication that analert state is currently associated with the PAN by an entity associatedwith issuance of the card; and modify, based on the received alertdetection indication, an operational mode of the card from the useablestate to the alert state. The system can also include an electronicdisplay coupled to the electronic controller and embedded in the cardand operable to: receive, from the electronic controller, informationthat the card is in the alert state; and provide a visual indicationthat the card is in the alert state. The system can also include memorystoring one or more PANs assigned to the card. The system can alsoinclude one or more processors performing operations, using the memory,the operations including operations of the electronic controller and theelectronic display.

Other implementations of this aspect include corresponding computersystems, apparatus, and computer programs recorded on one or morecomputer storage devices, each configured to perform the actions of themethods. A system of one or more computers can be configured to performparticular operations or actions by virtue of having software, firmware,hardware, or a combination of software, firmware, or hardware installedon the system that in operation causes (or causes the system) to performthe actions. One or more computer programs can be configured to performparticular operations or actions by virtue of including instructionsthat, when executed by data processing apparatus, cause the apparatus toperform the actions.

The foregoing and other implementations can each optionally include oneor more of the following features, alone or in combination. Inparticular, one implementation can include all the following features:

In a first aspect, combinable with any of the previous aspects, thesystem further includes a chip embedded in the card and operable to beread by chip readers.

In a second aspect, combinable with any of the previous aspects, thealert detection indication originates at the entity and includes a frauddetection indication indicating that fraudulent activity of the card issuspected or has been detected.

In a third aspect, combinable with any of the previous aspects, theattempted data exchange includes a monetary transaction.

In a fourth aspect, combinable with any of the previous aspects, theinterface includes a power modulation or a receiving module of the card.

In a fifth aspect, combinable with any of the previous aspects, theattempted data exchange includes an attempted use of the card at apoint-of-sale (POS) terminal.

In a sixth aspect, combinable with any of the previous aspects, theattempted use includes a near-field communication (NFC) communicationbetween the card and the POS terminal.

In a seventh aspect, combinable with any of the previous aspects, theattempted use includes a communication between the card and a controllerof the POS terminal.

In an eighth aspect, combinable with any of the previous aspects, thecontroller of the POS reader is a card reader of the POS terminal.

In a ninth aspect, combinable with any of the previous aspects,modifying the operational mode of the card to the alert state includesmaking the card unusable for further data exchanges using the card.

In a tenth aspect, combinable with any of the previous aspects, theattempted data exchange is associated with a particular PAN, and whereinthe alert state causes the particular PAN to be invalid for further dataexchanges.

In an eleventh aspect, combinable with any of the previous aspects, theelectronic display is a light-emitting diode (LED), and wherein the LEDdisplays a fraud indication color for the alert state of the card thatis different from a color displayed for a usable state of the card.

In a twelfth aspect, combinable with any of the previous aspects, thecard includes a credit card, a debit card, a value-added card, apoint-of-entry card, or an identification card.

In a thirteenth aspect, combinable with any of the previous aspects, theattempted data exchange is associated with a particular PAN, and whereinthe alert state causes the particular PAN to be invalid for further dataexchanges.

In a fourteenth aspect, combinable with any of the previous aspects,electronic display includes a light-emitting diode (LED), and whereinthe LED displays a fraud indication color for the alert state of thecard that is different from a color displayed for a usable state of thecard

For example, a system for unlocking a card, such as an electronic card,can include a biometric sensor operable to read a biometric input of acardholder of the card, the biometric input associated with an attemptedauthentication, by the cardholder, as an authorized user of the card,wherein one or more authorized users are defined by an entity associatedwith the card. The system can also include an electronic controllerembedded in the card and coupled to the biometric sensor, the electroniccontroller operable to: receive, from the biometric sensor and via anelectronic controller embedded in the card at a time when the card hasan operational mode of an unusable state, the received biometric inputof the cardholder, the unusable state of the card being previouslyidentified by the entity for a particular permanent account number(PAN), the particular PAN invalidated for use in further data exchangesusing the card; determine that the received biometric input matches apre-loaded biometric profile stored on the card, the pre-loadedbiometric profile associated with the authorized user of the card;activate, based on the biometric input match, a new PAN for the card,the new PAN usable in further data exchanges of the card; and modify, bythe electronic controller, the operational mode of the card to a usablestate. The system can also include a first electronic display embeddedin the card and coupled to the electronic controller, the firstelectronic display operable to: receive, from the electronic controller,information that the card is in the usable state and provide a visualindication that the card is in the usable state. The system can alsoinclude memory storing: one or more PANs assigned to the card; and oneor more biometric profiles of users authorized to use the card. Thesystem can also include one or more processors performing operations,using the memory, the operations including operations of the electroniccontroller and the electronic display.

The foregoing and other implementations can each optionally include oneor more of the following features, alone or in combination. Inparticular, one implementation can include all the following features:

In a first aspect, combinable with any of the previous aspects, thesystem further includes a chip embedded in the card and operable to beread by chip readers.

In a first aspect, combinable with any of the previous aspects, thebiometric input consists of at least one of a finger print, a palmprint, a voice print, an image of a face, an iris scan, a retinal scan,and a body scent.

In a second aspect, combinable with any of the previous aspects, thesystem further includes a second electronic display operable to presentthe new PAN.

In a third aspect, combinable with any of the previous aspects, thesecond electronic display and the first electronic display comprise asingle display.

In a fourth aspect, combinable with any of the previous aspects, thesecond electronic display is separate from the first electronic display.

In a fifth aspect, combinable with any of the previous aspects, thesecond electronic display is a liquid crystal display (LCD) displayarea, and wherein the first electronic display is a light emitting diode(LED) indicator.

In a sixth aspect, combinable with any of the previous aspects, the newPAN activated for the card is one of the one or more PANs stored to thecard.

In a seventh aspect, combinable with any of the previous aspects, theactivated new PAN is one of: a next PAN in a set of pre-loaded PANs onthe card; or a randomly-assigned PAN assigned from the set of pre-loadedPANs, wherein the pre-loaded PANs on the card correspond to a set ofvalid PANs stored at the entity.

In an eighth aspect, combinable with any of the previous aspects, thesystem further includes a chip embedded in the card and operable to beread by chip readers, the chip coupled with the biometric sensor, theelectronic controller, and the first electronic display.

In a ninth aspect, combinable with any of the previous aspects, thefurther data exchanges include monetary transactions.

In a tenth aspect, combinable with any of the previous aspects, thefirst electronic display includes a light-emitting diode (LED), andwherein the LED displays a fraud indication color for the alert state ofthe card that is different from a color displayed for a usable state ofthe card.

In an eleventh aspect, combinable with any of the previous aspects, thecard consists of at least one of a credit card, a debit card, avalue-added card, a point-of-entry card, and an identification card.

The subject matter described in this specification can be implemented inparticular implementations so as to realize one or more of the followingadvantages. First, a fraud alert indication can be provided on a card,such as using an ultra-low power light-emitting diode (LED). Second, thecard can provide a real-time fraud detection mechanism at a point ofsale (POS) terminal, including switching the card into an OFF mode (or ablocked or unusable state) once the fraud alert is triggered. Third, aconsumer can have an option to reset the card, including turning thefraud alert OFF, e.g., using a built-in fingerprint sensor, which canalso return the card back to ON mode (unblocked and usable). Fourth, thefraud alert reset initiated by the cardholder can result in theassignment of a new PAN being generated for the card in sync with acard-issuing host, such as a bank or financial institution. Fifth, theability to reset the card can eliminate the need for card reissuance, ifthe card (or associated account number) has been compromised.

The details of one or more implementations of the subject matter of thisspecification are set forth in the accompanying drawings and thedescription below. Other features, aspects, and advantages of thesubject matter will become apparent from the description, the drawings,and the claims.

DESCRIPTION OF DRAWINGS

FIG. 1 is a block diagram of a card system for setting usability stateson a card.

FIG. 2A is a swim lane diagram showing an example method for locking acard.

FIG. 2B is a swim lane diagram showing an example method for unlocking acard.

FIG. 3A is a flowchart of an example method for placing a card into analert state.

FIG. 3B is a flowchart of an example method for placing a card into analert state, from the perspective of a POS.

FIG. 3C is a flowchart of an example method for placing a card into analert state, from the perspective of an entity.

FIG. 4A is a flowchart of an example method for placing a card into ausable state.

FIG. 4B is a flowchart of an example method for placing a card into ausable state, from the perspective of a POS.

FIG. 4C is a flowchart of an example method for placing a card into ausable state, from the perspective of an entity.

FIG. 5 is a schematic diagram of an example of a computer system.

Like reference numbers and designations in the various drawings indicatelike elements.

DETAILED DESCRIPTION

This disclosure generally describes computer-implemented methods,software, and systems for using a smart chip card with a fraud alert anda biometric reset. For example, when a card, such as a credit card, isdetermined to be in a fraud state, an authorization response can set afraud alert flag status, such as inside a Europay, MasterCard, Visa(EMV) issuer authentication data (ISO) 8583 data element that can bedigitally signed with an issuer host private key. When fraud isdetected, for example, the fraud alert flag status can be set to ON.Otherwise, during times of normal authorized use of the card, the fraudalert flag status can be set to OFF. The EMV issuer authentication datacan eventually be delivered to the card. Delivery can occur, forexample, when a cardholder is asked to insert the card into a POSterminal, which can happen after a counter for a maximum number ofconsecutive contactless transactions is exceeded. The card can analyzethe delivered response, and if the fraud alert flag status is ON, thenthe card can switch an LED on the card to red (e.g., versus normal usagewhen the LED is GREEN), blocking the card for further transactions andinvalidating a current PAN in the card. Other sequences for blocking acard are possible. In some implementations, updates to the card canoccur wirelessly, such as through near-field communication, Bluetooth,or another communication protocol.

Once the card is blocked and its PAN is invalidated, the cardholder mustpass at least one biometric validation (e.g., a fingerprint validationor a thumb print validation) using the card to unblock the card andenable the card for further use. This action can also set the new PAN inthe card, either by choosing from a pre-loaded array of PANs (e.g.,pre-loaded during personalization) or by dynamically generating a newPAN through a process that uses an end-to-end format preserving PANencryption method. Such a process can combine, for example, a currentEMV application transaction counter (ATC), a previous PAN, and a threedata encryption standard (3DES) key shared with the issuer host. In someinstances, the new PAN can be displayed, such as on a liquid crystaldisplay (LCD) screen. In other instances, PANs may be hidden from thecardholder and may not be displayed on the card, or may be displayed ina separate display at a location remote from the card (e.g., a mobiledevice, a POS location, etc.). Other sequences for unblocking a card arepossible, such as through an audible verification or other biometricverifications. In some implementations, the PAN is not displayed on thecard, but can be displayed apart from the card in different instances.

FIG. 1 is a block diagram of a card system 100 for setting usabilitystates on a card 102. For example, the card 102 can be an electroniccard, such as a card having embedded electronics, including one or moreprocessors and memory storing instructions that can be executed by theone or more processors. When the card 102 is in a useable state, thecard system 100 can be used to put the card 102 into an alert state(e.g., an unusable state). In another example, when the card 102 is inan unusable state (e.g., an alert state or a fraud state), the cardsystem 100 can be used to put the card 102 into a useable state. Theattempted data exchange can be associated with a particular PAN, and thealert state can cause the particular PAN to be invalid for further dataexchanges.

The card 102 can be any type of card for which transactions can occur,including a credit card, a debit card, a value-added card, apoint-of-entry card, an identification card, a loyalty card, a giftcard, or some other consumer card, an ID verification card. In someimplementations, the card system 100 can be used for electronic objectsthat are not cards, such as point-of-entry scanners, security systems,medical facilities, government facilities, public facilities, equipmentand hardware.

A physical view 102 a of the card 102 shows that the card 102 caninclude a visible display element 103 b of an electronic display 106 anda visible sensor surface 103 c of a biometric sensor 108. The biometricsensor 108 can be operable to read a biometric input of a cardholder ofthe card. As described below with reference to FIG. 2B, the biometricinput can be an attempted authentication, by the cardholder, as anauthorized user of the card. For example, one or more authorized userscan be defined by an entity (e.g., a bank or other financialinstitution) associated with the card 102, such as the central server114. In some implementations, the biometric sensor 108 can be capable ofscanning a thumb print 103 d, such as the thumb print of the user towhom the card 102 is issued. Other types of biometric inputs can be readby or used for the biometric sensor 108, such as one or more of a fingerprint, a palm print, a voice print, an image of a face, an iris scan, aretinal scan, or a body scent.

The card 102 can also include a chip 103 a that is embedded in the cardand is operable to be read by chip readers such as point-of-sale (POS)terminals, card readers, or other equipment. The card 102 can alsoinclude visible account information 103 e, such as including accountnumbers, expiration dates, cardholder names, cardholder images, andother visible information.

A functional view 102 b of the card 102 shows an electronic controller104 that is embedded in the card 102 and coupled with the electronicdisplay 106. The electronic controller 104 can receive an alertdetection indication during an attempted data exchange using a PANassociated with the card. The attempted data exchange can be, forexample, a monetary transaction, such as a purchase transaction usingthe card 102 that occurs when making a purchase at a brick-and-mortarlocation. For example, the attempted data exchange can be an attempteduse of the card 102 at a POS terminal 112. The attempted data exchangeof the card 102 can include, for example, a near-field communication(NFC) communication between the card 102 and the POS terminal 112. Inanother example, the attempted data exchange of the card 102 can includea communication between the card and a controller of the POS terminal112. In some implementations, the controller can be a card reader of thePOS terminal 112. The attempted data exchange can occur, for example,when the card 102 is in (or is thought to be in) a useable state, suchas after one or more recent successful transactions (in which thetransactions and the card were not denied). The alert detectionindication can be, for example, an indication that an alert state iscurrently associated with the PAN by an entity associated with issuanceof the card. The entity may be, for example, a central server 114, suchas a bank or other financial institution that issued the card to theuser. The alert detection indication can originate, for example, at theentity. The alert detection indication can serve as a fraud detectionindication, e.g., indicating that fraudulent activity of the card issuspected or has been detected. In some implementations, an interface inthe card 102 can receive the alert detection indication. In someimplementations, the interface can include a power modulation or areceiving module of the card 102.

In some non-limiting embodiments in which the card employs a passivecapacitive biometric sensor, the sensor may be powered passively from anexternal source. In other embodiments where the card employs anactively-powered sensor, the sensor and associated hardware may bepowered through the power modulation of the card. When the alertdetection indication is received, the electronic controller 104 canmodify an operational mode of the card, for example, by changing thestate of the card 102 from a useable state to the alert state. In someimplementations, modifying the operational mode of the card to the alertstate can include making the card 102 unusable for further dataexchanges (e.g., monetary transactions) using the card 102.

The electronic controller 104 can also perform operations associatedwith unlocking a card. For example, at a time that the card 102 has anoperational mode of an unusable state, the electronic controller 104 canreceive, from the biometric sensor 108, a biometric input (e.g., thumbprint) of the cardholder. The unusable state of the card 102 can havebeen previously identified by an entity (e.g., bank or financialinstitution) for a particular permanent account number (PAN), thusinvalidating the particular PAN for use in further data exchanges usingthe card 102. Upon receipt of the biometric input, for example, theelectronic controller 104 can determine that the received biometricinput matches a pre-loaded biometric value or profile stored on the card(e.g., in biometric values or profiles 120) and that is associated withan authorized user of the card. Biometric inputs can include one or moreof a finger print, a palm print, a voice print, an image of a face, aniris scan, a retinal scan, or a body scent. Based on the determinationthat the received biometric input matches a stored biometric value of anauthorized user, the electronic controller 104 can activate a new PANfor the card, the new PAN being usable in further data exchanges of thecard 102. In some implementations, a biometric input may be sharedand/or sent to backend for verification, such as if the biometric valueor profile is not stored directly on card. The new PAN activated for thecard 102 can be one of the one or more PANs stored to the card 102, suchas in the pre-loaded PANs 118. The activated new PAN can be, forexample, a next PAN in the set of pre-loaded PANs stored on the card, ora randomly-assigned PAN assigned from the set of pre-loaded PANs. Thepre-loaded PANs on the card 102 can correspond, for example, to a set ofvalid PANs stored at the entity (e.g., the central server 114). Theelectronic controller 104 can also modify the operational mode of thecard to a usable state and provide information (e.g., a command) to theelectronic display 106 that the card is now usable again.

An electronic display 106 can update the visible display element 103 bbased on information that is to be displayed to the cardholder. Forexample, actions taken by the electronic display 106 can be based onreceived inputs from one or more components of the card, such asinformation that is received from the electronic controller 104 that thecard is in the alert state. In some implementations, the electroniccontroller 104 can provide an alert message, from which the electronicdisplay 106 is programmed (e.g., based on application logic or tablelook-up) to change or set the visible display element 103 b to apre-determined color (e.g., red to replace a color, e.g., green,indicating non-fraud, usable state of the card 102, or activate an imageor visual indication when in a non-usable state). Other actions arepossible, such as providing visual (and/or audible) alert, including adescription of the reason for the alert (e.g., fraud has been detected,an account has been denied, or other information). Other indications notusing the card are also possible, including indications provided toanother location, such as at a phone (or other mobile device) or at thePOS. Such other locations can send and receive signals with the card,either in parallel or instead of the indication on the card. When theelectronic display 106 receives information from the electroniccontroller 104 that the card is in the alert state, the visible displayelement 103 b can display a red indicator, for example. Other colorsand/or displays can be used, for example, to indicate other information,such as a yellow color being presented if the cardholder should contactan entity (e.g., the card-issuing bank) for some reason. Alternatively,an indication may only be shown on the visible display element 103 b orelsewhere on or related to the card 102 when the alert is triggered oractive.

At a different time, the electronic display 106 can receive informationfrom the electronic controller 104 that the card is now in a usablestate, such as after the cardholder has provided a biometric input tore-authenticate the card 102. The electronic display 106 can receive,such as from the electronic controller 104, information that the card102 is in the usable state. Based on the received information, theelectronic display 106 can provide a visual indication (e.g., greenlight or indicator) that is viewable by the cardholder and thatindicates that the card 102 is in a usable state. As a result, the card102 is then capable of being used in further data exchanges, e.g.,monetary transactions.

In some implementations, a usable state of the card 102 (and/or adisplay of a usable color on the visible display element 103 b) canindicate that the card 102 has been activated for a first time. Forexample, activation can be initiated by the user by calling an 800number or activating the card online to register receipt of the card 102when received (e.g., by mail).

In some implementations, the electronic display 106 can be alight-emitting diode (LED). For example, the LED can display a fraudindication color (e.g., red) for the alert state of the card that isdifferent from a color (e.g., green) displayed for a usable state of thecard. In some implementations, the LED can be an ultra-low power LED.Other types of display lighting and presentation can be used. Moreover,in addition to the display, other features, including audible features,can be used. In some implementations, the electronic display 106 can bea liquid crystal display (LCD) or some other type of display.

In some implementations, a second electronic display can exist on thecard 102. For example, the second electronic display can be operable topresent a new PAN to which the card 102 is associated upon successfulunlocking of the card 102. In some implementations, the secondelectronic display can be the same as a first electronic display (e.g.,the electronic display 106), or the second electronic display can bedifferent from the first electronic display. In some implementations,the second electronic display can be a LCD display area, and the firstelectronic display can a light emitting diode (LED) indicator. In someimplementations, the second electronic display and the first electronicdisplay can be combined, e.g., capable of displaying a color (e.g., redor green, depending on a current state of the card 102), and text (e.g.,to present the new PAN and/or other textual information).

Memory 110 on the card 102 can include storage of a card state 116,e.g., indicating that the card 102 is in an operational state of usable,unusable, and possibly other states, such as a pending state if the card102 is waiting to receive information that would make the card 102usable again (if recently in an unusable state). Memory 110 on the card102 can include storage of pre-loaded PANs 118, e.g., that include oneor more PANs that are assigned to the card 102 (and available foractivation, if ever needed). Memory 110 can also store the biometricvalues or profiles 120 that include one or more biometric valuesassociated with and uniquely identifying users who are authorized to usethe card. Memory 110 may include any type of memory or database module,as described in detail below.

One or more processors 122 embedded in the card 102 can performoperations, including operations of the electronic controller 104, theelectronic display 106, the biometric sensor 108, and any othercomponents of the card not depicted in FIG. 1.

In some implementations, the use of biometric inputs can be required forone or more transactions, such as transactions occurring for particularPOS terminals and/or transactions having transaction amounts over athreshold monetary amounts (or in other cases). In some implementations,the use of biometric inputs and validations can be included to reset acard without requiring the use of a new PAN, such as if fraud wassuspected but the user/cardholder has indicated that the potentiallyfraudulent transactions are legitimate. In such cases, the use ofbiometric inputs may be required to authenticate the user.

FIG. 2A is a swim lane diagram showing an example method 200 for lockinga card. For clarity of presentation, the description that followsgenerally describes method 200 in the context of FIG. 1. However, itwill be understood that the method 200 may be performed, for example, byany other suitable system, environment, software, and hardware, or acombination of systems, environments, software, and hardware asappropriate. For example, the card 102 and/or its components,particularly the electronic controller 104, can be used to execute themethod 200.

At a time that the method 200 is applicable, the card 102 can be in ausable state 202. For example, the time can be a time at which the cardis in (or is thought to be in) a useable state, such as after one ormore recent successful transactions using the card 102. The time is alsoa time just prior to an attempted data exchange, such as when thecardholder is about to make a purchase using the card 102 at a POSterminal 112. The visible display element 103 b may be displaying acolor (e.g., green, or some other visible indicator) at this time,indicating that the card 102 is (or thought to be) usable.

At 204, an attempted data exchange (e.g., a monetary transaction) canoccur that uses a particular permanent account number (PAN) associatedwith the card 102. For example, the attempted data exchange can occurwhen the cardholder uses the card 102 at the POS terminal 112, such asby inserting the card 102 into a chip reader, or swiping the card 102,or via a wireless communication interaction (e.g., NFC-basedcommunications). At that time, the PAN associated with the card can bethe currently activated one of multiple PANs that were pre-loaded on thecard 102 by an entity (e.g., the central server 114, such as a bank, athird-party card preparer, etc.). Other attempted data exchanges arepossible, including online uses of the card 102, such as on shopping websites and payment screens.

At 206, the POS terminal 112 can provide transaction informationassociated with the attempted data exchange to the central server 114.The transaction information can include, for example, the PAN used inthe attempted data exchange and a transaction amount.

At 207, an alert state associated with the PAN is determined. Forexample, the central server 114 can use the received PAN and as part ofa verification process of a transaction being executed, which can resultin determining that the PAN has been compromised, such as based ondetected or reported fraudulent activity or for some other reason.

At 208, the central server 114 can provide an alert that can be receivedat the POS terminal 112. The alert can be generated by the centralserver 114, for example, if fraud has been detected in association withthe PAN, or if a credit limit or balance have been identified using theprovided transaction amount. Other types of reasons for an alert can beused.

At 210, an alert detection indication can be received by the electroniccontroller 104, such as through an interface in the card 102. In someimplementations, the interface can include a power modulation or areceiving module of the card. The alert detection indication can be anindication that the PAN has an alert state identified for the PAN by thecentral server 114 (or some other entity that issued the card). Thealert detection indication can apply to a current PAN activated on thecard 102, or the alert detection indication can apply to some otheraccount identifier or account number, such as that may apply todifferent types of cards 102. The fraud detection indication canindicate, for example, that fraudulent activity of the card 102 (or moregenerally, the PAN assigned to the card) is suspected or has beendetected.

At 212, the electronic controller 104 can modify an operational mode ofthe card 102 into the alert state. The electronic controller 104 canmake the modification based on receipt of the alert detection indicationfrom the POS terminal 112, for example. Modifying the operational modeof the card 102 to the alert state can include making the card unusablefor further data exchanges using the card 102.

At 214, the card 102 is in an alert state, meaning that the card 102 isnot usable for transactions, including, for example, causing theparticular PAN to be invalid for further data exchanges. In someimplementations, the alert state can be represented in the card 102 bystorage of the current card state 116.

At 216, the electronic display 106 can provide a visual indication thatthe card 102 is in the alert state. In some implementations, theelectronic controller 104 can provide a command or some otherinformation that the electronic display 106 can use to update thevisible display element 103 b at that time, such as changing the coloror the visible display element 103 b to red or providing some otherdisplay indicating that the card 102 is unusable.

At 218, the electronic display 106 can update the visible displayelement 103 b, such as by turning the color of the display to red (e.g.,replacing green).

FIG. 2B is a swim lane diagram showing an example method 230 forunlocking a card. For clarity of presentation, the description thatfollows generally describes method 230 in the context of FIG. 1.However, it will be understood that the method 230 may be performed, forexample, by any other suitable system, environment, software, andhardware, or a combination of systems, environments, software, andhardware as appropriate. For example, the card 102 and/or itscomponents, particularly the electronic controller 104, can be used toexecute the method 230.

At a time that the method 230 is applicable, the card 102 is in anunusable state 232. For example, the time can be a time after which thecard has been put in an unusable state, such as the alert state, throughthe steps of the method 200 described above with reference to FIG. 2A.At this time, the visible display element 103 b may be displaying anindication (e.g., a color indicative of the alert state (e.g., red),text or an image, or some other visible indicator), indicating that thecard 102 is unusable. The card 102 may also be in an unusable state wheninitially received, such as by mail, and before activation by a user,such as by calling an 800 activation number or activating the card 102online. At such time, the user may activate the card prior to a firstuse, such as at a POS terminal.

At 234, the electronic controller 104 embedded in the card 102 that hasan operational mode of an unusable state can receive a biometric input(e.g., a thumb print) from the biometric sensor 108. The biometric inputcan be a biometric data point, identifier, or value for or associatedwith a user to which the card is issued by an entity, such as by thecentral server 114. At this time, the unusable state of the card canhave been previously identified by the entity for a particular PANassigned to the card 102. The unusable state of the card can indicatethat particular PAN is invalidated for use in further data exchangesusing the card 102.

At 236, the electronic controller 104 can determine that the receivedbiometric input matches one of one or more stored biometric values ofusers authorized to use the card, such as the biometric values orprofiles 120 stored in memory 110, such as stored as biometric profiles,data sets, or in other ways.

At 238, the electronic controller 104 can activate, based on determininga match of the received biometric input, a new PAN for the card. The newPAN can be usable in further data exchanges of the card. The new PANactivated for the card 102 can be one of the one or more PANs stored tothe card 102, such as in the pre-loaded PANs 118. The activated new PANcan be, for example, a next PAN in a set of pre-loaded PANs on the card,or a randomly-assigned PAN assigned from the set of pre-loaded PANs orfrom PANs generated for the card in sync with the card-issuing host.

At 240, the electronic controller 104 can, for example, inform the POSterminal 112 that the card has been reactivated. The information caninclude the new PAN (and potentially other information), and the POSterminal 112 can forward the information to the central server 114 orthe appropriate payment/payment network such as Visa or MasterCard. At242, the new PAN can be relayed to the central server 114.

At 244, the central server 114 can associate the user account with thereceived new PAN, including confirming that the new PAN as valid from alist of PANs associated with the card. In some implementations,confirming that the new PAN is valid can occur in combination withallowance of a new transaction that uses the new PAN. In someimplementations, confirming that the new PAN is valid can be separatefrom any new transaction that uses the new PAN. In some implementations,confirmation of a new PAN on the card can occur wirelessly. For example,a password can be input into the mobile device, where the password isgenerated from the card and displayed on the visual display of the card(or alternatively, in a user interface of the mobile device). Enteringthe password can initiate the new PAN and confirm that the user hasreceived the new PAN.

At 246, the central server 114 can acknowledge that the new PAN isactivated. At 248, the POS terminal 112 can relay the acknowledgement tothe card 102.

At 250, the electronic controller 104 can modify the operational mode ofthe card to a usable state. For example, the electronic controller 104set the card state 116 to a usable state.

At 252, the card 102 is in a usable state, meaning that the card 102 isnow again usable for transactions, including, for example, indicatingthat the newly-assigned PAN is valid for further data exchanges. In someimplementations, the usable state can be represented in the card 102 bystorage of the current card state 116.

At 254, the electronic controller 104 can provide information to theelectronic display 106 that the card is usable. For example, theinformation can be a flag that is used by the electronic display to lookup a color for updating the display. In another example, the informationcan include a code that looks up a coded message that has placeholdersfor filling in other information, such as the PAN, account-relatedinformation, or user-related information.

At 256, the electronic display 106 can update the visible displayelement 103 b, such as turning the color of the display to green (e.g.,replacing red).

FIG. 3A is a flowchart of an example method 300 for placing a card intoan alert state. For clarity of presentation, the description thatfollows generally describes method 300 in the context of FIGS. 1-2B.However, it will be understood that the method 300 may be performed, forexample, by any other suitable system, environment, software, andhardware, or a combination of systems, environments, software, andhardware as appropriate. For example, the card 102 and/or its componentscan be used to execute the method 300.

At 302, an alert detection indication is received during an attempteddata exchange using a PAN associated with a card. The alert detectionindication is received by an electronic controller embedded in the cardand is received through an interface. The alert detection indicationindicates that the PAN has an alert state identified for the PAN by anentity that issued the card. For example, the card 102 can receive analert detection indication from the POS terminal 112, as described abovewith reference to steps 202-210 of FIG. 2A.

At 304, an operational mode of the card is modified into the alert stateby the electronic controller and is based on receipt of the alertdetection indication. As an example, the electronic controller 104 canplace the card 102 into an alert state, as described above withreference to steps 212-214 of FIG. 2A.

At 306, an electronic display indicating that the card is in the alertstate is displayed by the electronic controller. For example, theelectronic display 106 can update the visible display element 103 b,such as by turning the color of the display to red (e.g., replacinggreen).

FIG. 3B is a flowchart of an example method 320 for placing a card intoan alert state, from the perspective of a POS. For clarity ofpresentation, the description that follows generally describes method320 in the context of FIGS. 1-2B. However, it will be understood thatthe method 320 may be performed, for example, by any other suitablesystem, environment, software, and hardware, or a combination ofsystems, environments, software, and hardware as appropriate. Forexample, the card 102 and/or its components can be used to execute themethod 320.

At 322, during use of a card in a usable state, an attempted dataexchange using a PAN associated with the card is processed. For example,the POS terminal 112 can receive (e.g., at 204 in FIG. 2A) an attempteddata exchange (e.g., a monetary transaction) that uses a particular PANassociated with the card 102.

At 324, information associated with the attempted data exchange isprovided to an entity that issued the card. For example, at 206 of FIG.2A, the POS terminal 112 can provide transaction information associatedwith the attempted data exchange to the central server 114.

At 326, alert information for the PAN associated with the card isreceived from the entity. For example, at 208 of FIG. 2A, the POSterminal 112 can receive the alert from the central server 114.

At 328, an alert detection indication is provided to the card forplacing the card in an unusable state including making the card unusablefor subsequent transactions using the PAN. For example, at 210 of FIG.2A, the POS terminal 112 can provide the alert detection indication tothe card 102.

FIG. 3C is a flowchart of an example method 340 for placing a card intoan alert state, from the perspective of an entity. For clarity ofpresentation, the description that follows generally describes method340 in the context of FIGS. 1-2B. However, it will be understood thatthe method 340 may be performed, for example, by any other suitablesystem, environment, software, and hardware, or a combination ofsystems, environments, software, and hardware as appropriate. Forexample, the card 102 and/or its components can be used to execute themethod 340.

At 342, information associated with an attempted data exchange using aPAN associated with the card is received from a POS during use of a cardin a usable state. For example, at 206 of FIG. 2A, the central server114 can receive, from the POS terminal 112, transaction informationassociated with the attempted data exchange.

At 344, a determination is made that fraud has been detected for thePAN. For example, at 207 of FIG. 2A, the central server 114 can use thereceived PAN to determine that the PAN has been compromised, such asbased on detected or reported fraudulent activity or for some otherreason.

At 346, an alert detection indication is provided to the POS for placingthe card in an unusable state, including making the card unusable withsubsequent transactions using the PAN. For example, at 208 of FIG. 2A,the central server 114 can provide the alert to the POS terminal 112.The POS terminal 112 can then provide the indication to the card 102.

FIG. 4A is a flowchart of an example method 400 for placing a card intoa usable state. For clarity of presentation, the description thatfollows generally describes method 400 in the context of FIGS. 1-2B.However, it will be understood that the method 400 may be performed, forexample, by any other suitable system, environment, software, andhardware, or a combination of systems, environments, software, andhardware as appropriate. For example, the card 102 and/or its componentscan be used to execute the method 400.

At 402, a biometric input is received for a user to which a card hasbeen issued by an entity. For example, at the time that the biometricinput is received, the card can have an operational mode of an unusablestate that has been previously identified by the entity (e.g., thecentral server 114) for a particular PAN. The particular PAN isinvalidated for use in further data exchanges using the card 102. Thebiometric input can be received, for example, by an electroniccontroller embedded in the card 102, as described with reference to step234 of FIG. 2B.

At 404, a determination is made that the biometric input matches one ofone or more stored biometric values of or associated with usersauthorized to use the card. As an example, the electronic controller 104can determine that the received biometric input matches at least one ofthe stored biometric values of users who are authorized to use the card102. Determining a match, for example, can be based on using informationin the biometric values or profiles 120 stored in memory 110.

At 406, based on the biometric input match, a new PAN is activated forthe card. The new PAN is usable in further data exchanges of the card.For example, as described with reference to step 238 of FIG. 2B, basedon determining a match of the received biometric input, the electroniccontroller 104 can activate a new PAN for the card. The new PAN can beusable in further data exchanges of the card. The new PAN activated forthe card 102 can be one of the one or more PANs stored to the card 102,such as in the pre-loaded PANs 118. The activated new PAN can be, forexample, a next PAN in a set of pre-loaded PANs on the card, or arandomly-assigned PAN assigned from the set of pre-loaded PANs.

At 408, the operational mode of the card is modified to a usable stateby the electronic controller. For example, as described with referenceto step 250 of FIG. 2B, the electronic controller 104 set the card state116 to a usable state.

In some implementations, the method 400 can further include displaying,by the electronic controller, a first electronic display on the card,the first electronic display indicating that the card is in a usablestate. For example, the electronic display 106 can cause the visibledisplay element 103 b to display a color (e.g., green) that indicatesthat the card 102 is now active.

FIG. 4B is a flowchart of an example method 420 for placing a card intoa usable state, from the perspective of a POS. For clarity ofpresentation, the description that follows generally describes method420 in the context of FIGS. 1-2B. However, it will be understood thatthe method 420 may be performed, for example, by any other suitablesystem, environment, software, and hardware, or a combination ofsystems, environments, software, and hardware as appropriate. Forexample, the card 102 and/or its components can be used to execute themethod 420.

At 422, information is received from a card issued to a user by anentity that a new PAN has been activated for the card by actions of theuser. The new PAN is usable in further data exchanges of the card, andthe information includes the new PAN and information identifying thecard. For example, at 240 of FIG. 2B, the electronic controller 104 caninform the POS terminal 112 that the card has been reactivated. Theinformation can include the new PAN (and potentially other information).

At 424, the information is provided to the entity. As an example, at 242of FIG. 2B, the POS terminal 112 can relay the information to thecentral server 114. In some implementations, the POS terminal 112 canreceive an acknowledgement (e.g., at 406 of FIG. 2B) from the centralserver 114 and forward the acknowledgement (e.g., at 408 of FIG. 2B) tothe electronic controller 104.

FIG. 4C is a flowchart of an example method 440 for placing a card intoa usable state, from the perspective of an entity. For clarity ofpresentation, the description that follows generally describes method440 in the context of FIGS. 1-2B. However, it will be understood thatthe method 440 may be performed, for example, by any other suitablesystem, environment, software, and hardware, or a combination ofsystems, environments, software, and hardware as appropriate. Forexample, the card 102 and/or its components can be used to execute themethod 440.

At 442, information is received from a POS being used by a user that anew PAN has been activated for a card issued to the user by the entity.The new PAN is usable in further data exchanges of the card, and theinformation includes the new PAN and information identifying the card.As an example, at 242 of FIG. 2B, the POS terminal 112 can relay theinformation to the central server 114.

At 444, a determination is made that the new PAN is valid. As anexample, at 244, of FIG. 2B, the central server 114 can confirm that thenew PAN as valid from a list of PANs associated with the card 102.

At 446, the information is stored at a server of the entity. Forexample, the central server 114 can store information at a server of thecentral server 114 and/or at other locations. The information canindicate, for example, that the new PAN is authorized for transactionsusing the card 102. In some implementations, the central server 114 canprovide an acknowledgement (e.g., at 406 of FIG. 2B) to the POS terminal112.

FIG. 5 is a schematic diagram of an example of a computer system 500.The computer system 500 can be used for the operations described inassociation with methods and flows described above, according to atleast some implementations.

The computer system 500 includes a processor 510, a memory 520, astorage device 530, and an input/output device 540. Each of thecomponents 510, 520, 530, and 540 are interconnected using a system bus550. The processor 510 is capable of processing instructions forexecution within the computer system 500. In some implementations, theprocessor 510 is a single-threaded processor. In another implementation,the processor 510 is a multi-threaded processor. The processor 510 iscapable of processing instructions stored in the memory 520 or on thestorage device 530 to display graphical information for a user interfaceon the input/output device 540.

The memory 520 stores information within the computer system 500. Insome implementations, the memory 520 is a non-transitorycomputer-readable medium. In some implementations, the memory 520 is avolatile memory unit. In another implementation, the memory 520 is anon-volatile memory unit.

The storage device 530 is capable of providing mass storage for thecomputer system 500. In some implementations, the storage device 530 isa non-transitory computer-readable medium. In various differentimplementations, the storage device 530 may be a floppy disk device, ahard disk device, an optical disk device, or a tape device.

The input/output device 540 provides input/output operations for thecomputer system 500. In some implementations, the input/output device540 includes a keyboard and/or pointing device. In anotherimplementation, the input/output device 540 includes a display unit fordisplaying graphical user interfaces.

The features described can be implemented in digital electroniccircuitry, or in computer hardware, firmware, software, or incombinations of them. The apparatus can be implemented in a computerprogram product tangibly embodied in an information carrier, e.g., in amachine-readable storage device, for execution by a programmableprocessor; and method steps can be performed by a programmable processorexecuting a program of instructions to perform functions of thedescribed implementations by operating on input data and generatingoutput. The described features can be implemented advantageously in oneor more computer programs that are executable on a programmable systemincluding at least one programmable processor coupled to receive dataand instructions from, and to transmit data and instructions to, a datastorage system, at least one input device, and at least one outputdevice. A computer program is a set of instructions that can be used,directly or indirectly, in a computer to perform a certain activity orbring about a certain result. A computer program can be written in anyform of programming language, including compiled or interpretedlanguages, and it can be deployed in any form, including as astand-alone program or as a module, component, subroutine, or other unitsuitable for use in a computing environment.

Suitable processors for the execution of a program of instructionsinclude, by way of example, both general and special purposemicroprocessors, and the sole processor or one of multiple processors ofany kind of computer. Generally, a processor will receive instructionsand data from a read-only memory or a random access memory or both. Theessential elements of a computer are a processor for executinginstructions and one or more memories for storing instructions and data.Generally, a computer will also include, or be operatively coupled tocommunicate with, one or more mass storage devices for storing datafiles; such devices include magnetic disks, such as internal hard disksand removable disks; magneto-optical disks; and optical disks. Storagedevices suitable for tangibly embodying computer program instructionsand data include all forms of non-volatile memory, including by way ofexample semiconductor memory devices, such as EPROM, EEPROM, and flashmemory devices; magnetic disks such as internal hard disks and removabledisks; magneto-optical disks; and CD-ROM and DVD-ROM disks. Theprocessor and the memory can be supplemented by, or incorporated in,ASICs (application-specific integrated circuits).

To provide for interaction with a user, the features can be implementedon a computer having a display device such as a CRT (cathode ray tube)or LCD (liquid crystal display) monitor for displaying information tothe user and a keyboard and a pointing device such as a mouse or atrackball by which the user can provide input to the computer.

The features can be implemented in a computer system that includes aback-end component, such as a data server, or that includes a middlewarecomponent, such as an application server or an Internet server, or thatincludes a front-end component, such as a client computer having agraphical user interface or an Internet browser, or any combination ofthem. The components of the system can be connected by any form ormedium of digital data communication such as a communication network.Examples of communication networks include, e.g., a LAN, a WAN, and thecomputers and networks forming the Internet.

The computer system can include clients and servers. A client and serverare generally remote from each other and typically interact through anetwork, such as the described one. The relationship of client andserver arises by virtue of computer programs running on the respectivecomputers and having a client-server relationship to each other.

Although a few implementations have been described in detail above,other modifications are possible.

In addition, the logic flows depicted in the figures do not require theparticular order shown, or sequential order, to achieve desirableresults. In addition, other steps may be provided, or steps may beeliminated, from the described flows, and other components may be addedto, or removed from, the described systems. Accordingly, otherimplementations are within the scope of the following claims.

A number of embodiments of the invention have been described.Nevertheless, it will be understood that various modifications may bemade without departing from the spirit and scope of the invention.Accordingly, other embodiments are within the scope of the followingclaims.

In some implementations, components of the environments and systemsdescribed above may be any computer or processing device such as, forexample, a blade server, general-purpose personal computer (PC),Macintosh, workstation, UNIX-based workstation, or any other suitabledevice. In other words, the present disclosure contemplates computersother than general purpose computers, as well as computers withoutconventional operating systems. Further, components may be adapted toexecute any operating system, including Linux, UNIX, Windows, Mac OS®,Java™, Android™, iOS or any other suitable operating system. Accordingto some implementations, components may also include, or be communicablycoupled with, an e-mail server, a Web server, a caching server, astreaming data server, and/or other suitable server(s).

Processors used in the environments and systems described above may be acentral processing unit (CPU), an application specific integratedcircuit (ASIC), a field-programmable gate array (FPGA), or anothersuitable component. Generally, each processor can execute instructionsand manipulates data to perform the operations of various components.Specifically, each processor can execute the functionality required tosend requests and/or data to components of the environment and toreceive data from the components of the environment, such as incommunications between the external, intermediary and target devices.

Components, environments and systems described above may include amemory or multiple memories. Memory may include any type of memory ordatabase module and may take the form of volatile and/or non-volatilememory including, without limitation, magnetic media, optical media,random access memory (RAM), read-only memory (ROM), removable media, orany other suitable local or remote memory component. The memory maystore various objects or data, including caches, classes, frameworks,applications, backup data, business objects, jobs, web pages, web pagetemplates, database tables, repositories storing business and/or dynamicinformation, and any other appropriate information including anyparameters, variables, algorithms, instructions, rules, constraints, forreferences thereto associated with the purposes of the target,intermediary and external devices. Other components within the memoryare possible.

Regardless of the particular implementation, “software” may includecomputer-readable instructions, firmware, wired and/or programmedhardware, or any combination thereof on a tangible medium (transitory ornon-transitory, as appropriate) operable when executed to perform atleast the processes and operations described herein. Indeed, eachsoftware component may be fully or partially written or described in anyappropriate computer language including C, C++, Java™, Visual Basic,assembler, Perl®, any suitable version of 4GL, as well as others.Software may instead include a number of sub-modules, third-partyservices, components, libraries, and such, as appropriate. Conversely,the features and functionality of various components can be combinedinto single components as appropriate.

Devices can encompass any computing device such as a smart phone, tabletcomputing device, PDA, desktop computer, laptop/notebook computer,wireless data port, one or more processors within these devices, or anyother suitable processing device. For example, a device may comprise acomputer that includes an input device, such as a keypad, touch screen,or other device that can accept user information, and an output devicethat conveys information associated with components of the environmentsand systems described above, including digital data, visual information,or a graphical user interface (GUI). The GUI interfaces with at least aportion of the environments and systems described above for any suitablepurpose, including generating a visual representation of a Web browser.

The preceding figures and accompanying description illustrate exampleprocesses and computer implementable techniques. The environments andsystems described above (or their software or other components) maycontemplate using, implementing, or executing any suitable technique forperforming these and other tasks. It will be understood that theseprocesses are for illustration purposes only and that the described orsimilar techniques may be performed at any appropriate time, includingconcurrently, individually, in parallel, and/or in combination. Inaddition, many of the operations in these processes may take placesimultaneously, concurrently, in parallel, and/or in different ordersthan as shown. Moreover, processes may have additional operations, feweroperations, and/or different operations, so long as the methods remainappropriate.

In other words, although this disclosure has been described in terms ofcertain implementations and generally associated methods, alterationsand permutations of these implementations, and methods will be apparentto those skilled in the art. Accordingly, the above description ofexample implementations does not define or constrain this disclosure.Other changes, substitutions, and alterations are also possible withoutdeparting from the spirit and scope of this disclosure.

What is claimed is:
 1. A system for a card, the card being an electroniccard, the system comprising: an electronic controller embedded in thecard and operable to: receive, via an interface when the card is in auseable state, an alert detection indication during an attempted dataexchange using a permanent account number (PAN) associated with thecard, wherein the alert detection indication includes an indication ofalert state is currently associated with the PAN by an entity associatedwith issuance of the card; and modify, based on the received alertdetection indication, an operational mode of the card from the useablestate to the alert state; an electronic display coupled to theelectronic controller and embedded in the card and operable to: receive,from the electronic controller, information that the card is in thealert state; and provide a visual indication that the card is in thealert state; memory storing one or more PANs assigned to the card; andone or more processors performing operations, using the memory, theoperations including operations of the electronic controller and theelectronic display.
 2. The system of claim 1, further comprising a chipembedded in the card and operable to be read by chip readers.
 3. Thesystem of claim 1, wherein the alert detection indication originates atthe entity and includes a fraud detection indication indicating thatfraudulent activity of the card is suspected or has been detected. 4.The system of claim 1, wherein the attempted data exchange includes amonetary transaction.
 5. The system of claim 1, wherein the interfaceincludes a power modulation or a receiving module of the card.
 6. Thesystem of claim 1, wherein the attempted data exchange includes anattempted use of the card at a point-of-sale (POS) terminal.
 7. Thesystem of claim 6, wherein the attempted use includes a near-fieldcommunication (NFC) communication between the card and the POS terminal.8. The system of claim 6, wherein the attempted use includes acommunication between the card and a controller of the POS terminal. 9.The system of claim 8, wherein the controller of the POS terminal is acard reader of the POS terminal.
 10. The system of claim 1, whereinmodifying the operational mode of the card to the alert state includesmaking the card unusable for further data exchanges using the card. 11.The system of claim 1, wherein the attempted data exchange is associatedwith a particular PAN, and wherein the alert state causes the particularPAN to be invalid for further data exchanges.
 12. The system of claim 1,wherein the electronic display includes a light-emitting diode (LED),and wherein the LED displays a fraud indication color for the alertstate of the card that is different from a color displayed for a usablestate of the card.
 13. The system of claim 1, wherein the card consistsof at least one of a credit card, a debit card, a value-added card, apoint-of-entry card, and an identification card.
 14. Acomputer-implemented method comprising: receiving, by an electroniccontroller embedded in a card and through an interface, an alertdetection indication during an attempted data exchange using a permanentaccount number (PAN) associated with the card, wherein the alertdetection indication includes an indication that the PAN has an alertstate identified for the PAN by an entity that issued the card;modifying, by the electronic controller and based on receipt of thealert detection indication, an operational mode of the card into thealert state; and displaying, by the electronic controller, an electronicdisplay indicating that the card is in the alert state.
 15. Thecomputer-implemented method of claim 14, wherein the alert detectionindication originates at the entity and represents a fraud detectionindication indicating that fraudulent activity of the card is suspectedor has been detected.
 16. The computer-implemented method of claim 14,wherein the attempted data exchange includes a monetary transaction. 17.The computer-implemented method of claim 14, wherein the interfaceincludes a power modulation or a receiving module of the card.
 18. Thecomputer-implemented method of claim 14, wherein the attempted dataexchange is an attempted use of the card at a point-of-sale (POS)terminal.
 19. The computer-implemented method of claim 18, wherein theattempted use includes a near-field communication (NFC) communicationbetween the card and the POS terminal.
 20. A computer-readable media,the computer-readable media comprising computer-readable instructionsembodied on tangible, non-transitory media, the instructions operablewhen executed by at least one computer to perform operations comprising:receiving, by an electronic controller embedded in a card and through aninterface, an alert detection indication during an attempted dataexchange using a permanent account number (PAN) associated with thecard, wherein the alert detection indication includes an indication thatthe PAN has an alert state identified for the PAN by an entity thatissued the card; modifying, by the electronic controller and based onreceipt of the alert detection indication, an operational mode of thecard into the alert state; and displaying, by the electronic controller,an electronic display indicating that the card is in the alert state.