Patent classifications
G06Q20/3552
Cryptographic system management
A method of refreshing key material is described for use in a trusted execution environment logically protected from a regular execution environment. The trusted execution environment further comprises a key identifier. New key material is received at the trusted execution environment to replace existing key material. The key identifier is set to a new value to indicate that new key material is present. The new value of the key identifier is provided directly or indirectly to other parties in association with cryptographic outputs provided by the trusted execution environment using the refreshed key material. This approach is described in connection with an application executing securely on a mobile device.
NFC enabled card for consumer accessibility
A contactless card useful for adjusting the operation, configuration, and/or performance of a secondary device is described. The contactless card is equipped with a communication interface which allows the contactless card to transmit information to the secondary device using NFC signals. The contactless card stores accommodation information related to a physical accommodation desired by the user and transmits that information in the form of an accommodation message to the secondary device after being placed in a NFC field generated by the secondary device. In some embodiments, the contactless card requests an authentication certificate in order to determine a degree of trust prior to sending an accommodation message. In some embodiments, the contactless card may adjust what accommodation information is included in the accommodation message based on the authentication certificate received from the secondary device.
Systems and Methods for Provisioning Transaction Data to Mobile Communications Devices
The system comprises approving a credit application during a single http session, transmitting an encoded secure token to a web-client participating in the http session, receiving from the mobile communications device the secure token, and transmitting the transaction account data to the mobile communications device, in response to the receiving the secure token. The system may further comprise the mobile communications device decoding the secure token.
EXTENDED DATA STORAGE
Methods and apparatuses are provided for configuring and using a contactless application on a chip within a portable device comprising input/output connections arranged to communicate with other devices via a contact connection and via a contactless connection. One such method comprises a first process and a second process. The first process comprises receiving, at the chip and from a first other device, a set of computer instructions, to be executed by the chip, to create a contactless application in a data store of the chip and initialise at least one file associated with the contactless application. The second process comprises executing, by the chip of the portable device, the contactless application, to transmit data to a second other device.
On-demand payment generation transaction systems
Methods and systems for generating on-demand payment instruments are described. A user with a user payment account may perform a transaction with a user device and request an on-demand payment instrument. The request may be communicated to a transaction device. The transaction device may authenticate the request and associate an on-demand payment instrument to the user payment account. Information associated with the on-demand payment instrument information may then be tokenized and communicated to the user device, the merchant, or another party and the information may be entered and/or processed for the transaction.
Method and apparatus for payments between two mobile devices
Techniques for mobile devices configured to support settlement of charges in electronic invoices or bills are described. A first mobile device is used to obtain from a second mobile device data pertaining to the electronic invoices for payment. The data includes the electronic invoice and other information regarding a registered user of the second mobile device. After the user verifies the amount being charged and authorizes the payment, the first mobile device determines if there is a balance enough to cover the authorized payment before communicating with a payment server configured to proceed with the payment and send a confirmation to the second mobile device.
Method and a device for managing contactless applications
The invention relates to a portable object (OP) suitable for rendering at least one secure service (S) via a near field (NFC). The object comprises: a near field module (NFC) having an antenna (AN) and a microcontroller (CLF) for managing near field communication with a near field reader unit (2) external to the portable object; and a secure element (SE) comprising: memory means (MEM) for storing applications (APS) and data (DPS) relating to at least one secure service (S); and a communications module (I1) for communicating with the near field module (NFC) in order to exchange data relating to the secure service (S). The object is characterized in that it also includes a serial communications module (USB) connected to the security element (SE, SIM, I4), and in that the applications (APS) and the data (DPS) of the secure service (S) are transmitted to the security element via said serial communications module (USB).
Portable device with local verification data
Embodiments of the disclosure are directed to systems and methods in which verification data is written to a portable device and used to complete a transaction. The system may identify a number of trusted third-party entities computers capable of providing verification data associated with a particular user. The system may generate requests to each of the trusted third-party computers for that verification data. Upon receiving responses, the system may select an appropriate verification data from the responses received from those trusted third-party computers. The verification data is then written to a portable device, which is provided to a user with which it is associated. Once provided, the portable device may be used in a transaction conducted at a resource provider and the verification data may be caused to be displayed on a display operated by the resource provider.
DYNAMIC TRANSACTION CARD PROTECTED BY GESTURE AND VOICE RECOGNITION
A dynamic transaction card that includes a number of layers, each of which may be interconnected to one another, is disclosed. The dynamic transaction card may include an outer layer, a potting layer, a sensor layer, a display layer (including, for example, LEDs, a dot matrix display, and the like), a microcontroller storing firmware, Java applets, Java applet integration, and the like, an EMV chip, an energy storage component, one or more antennas (e.g., Bluetooth antenna, NFC antenna, and the like), a power management component, a flexible printed circuit board (PCB), a chassis, and/or a card backing layer. The dynamic transaction card may be activated by authenticating the card user through user authentication input recognition, which may be gesture and/or voice recognition processing.
TECHNIQUES TO DYNAMICALLY CREATE VALID CREDIT CARDS
Techniques to dynamic create valid credit cards are described. An apparatus, a computer-implemented method, and a computer-readable storage medium may implement such techniques and process virtual authorization data for authorizing a credit card to access a financial account, wherein the virtual authorization data comprises a representation of the financial account; activate the credit card using the virtual authorization data, the credit card having an integrated circuit configured for secure execution of transactions against the financial account; and store the virtual authorization data onto the integrated circuit of the credit card. Other embodiments are described and claimed.