Patent classifications
G06Q20/3576
Systems and methods for image capture vector format lasering engine
A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector formatted visible information lasered onto its surface. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format. The systems and methods may receive a request to add a first plurality of visible information to a transaction card and capture an image of the first plurality of visible information. The systems and methods may also map the image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machine.
PORTABLE ELECTRONIC DEVICE AND IC CARD
A portable electronic device of an embodiment includes a first value information storage unit, a second value information storage unit, a transaction processing unit, and a switching processing unit. The first value information storage unit stores first value information corresponding to a remaining amount of an amount paid in advance. The second value information storage unit stores second value information capable of being used in a credit transaction settlement. The transaction processing unit performs a prepaid settlement process of performing a settlement by subtracting the first value information stored by the first value information storage unit in accordance with an amount of a transaction. In a case where a predetermined condition based on information relating to the transaction is satisfied, the switching processing unit converts the first value information stored by the first value information storage unit into the second value information, stores the second value information in the second value information storage unit, validates a function of a credit transaction settlement process, and invalidates a function of the prepaid settlement process.
LOCAL CACHE-BASED IDENTIFICATION SYSTEM
An identification system uses a local cache for performing identifications. An identity system device may store identity information and identification information. An electronic device stores a cache of a portion of the identity information and a part of the identification information. The electronic device receives user input, determines an identity by comparing the user input to the cached identification information (such as by comparing a received digital representation of a biometric with cached biometric identification information), and performs an action using information in the cached identity information that is associated with the identity. The electronic device may update the identity information stored by the identity system device based on the action.
MULTI-FACED PAYMENT CARD WITH PARTITIONED DUAL SMART CHIPS AND ANTENNAE
The disclosed embodiments provide a payment card. The payment card may have a first face and a second face opposite the first. Additionally, the payment card may comprise a first smart chip, the first smart chip having contacts that are electronically accessible from the first face of the card. The payment card may further comprise a first antenna coupled to the first smart chip, the first antenna providing near-field contactless access to the first smart chip and a second smart chip, the second smart chip having contacts that are electronically accessible from the second face of the card. Additionally, the payment card may comprise a second antenna coupled to the second smart chip, the second antenna providing near-field contactless access to the second smart chip and an RF block that electronically isolates the first antenna and the second antenna from each other.
ROLLING ENCODING SCHEME FOR RFID TAGS
A gaming chip reader can read one or more gaming chips from an antenna. Drawers can be read from the gaming chip. A version can be identified from the drawers. A memory mapping can be decrypted and data describing the gaming chip can be decoded from the drawers using the decrypted memory map. The data describing the gaming chip can be validated against a gaming chip inventory dataset.
Multi-faced payment card with partitioned dual smart chips and antennae
The disclosed embodiments provide a payment card. The payment card may have a first face and a second face opposite the first. Additionally, the payment card may comprise a first smart chip, the first smart chip having contacts that are electronically accessible from the first face of the card. The payment card may further comprise a first antenna coupled to the first smart chip, the first antenna providing near-field contactless access to the first smart chip and a second smart chip, the second smart chip having contacts that are electronically accessible from the second face of the card. Additionally, the payment card may comprise a second antenna coupled to the second smart chip, the second antenna providing near-field contactless access to the second smart chip and an RF block that electronically isolates the first antenna and the second antenna from each other.
MULTI-FACED PAYMENT CARD WITH PARTITIONED DUAL SMART CHIPS AND ANTENNAE
The disclosed embodiments provide a payment card. The payment card may have a first face and a second face opposite the first. Additionally, the payment card may comprise a first smart chip, the first smart chip having contacts that are electronically accessible from the first face of the card. The payment card may further comprise a first antenna coupled to the first smart chip, the first antenna providing near-field contactless access to the first smart chip and a second smart chip, the second smart chip having contacts that are electronically accessible from the second face of the card. Additionally, the payment card may comprise a second antenna coupled to the second smart chip, the second antenna providing near-field contactless access to the second smart chip and an RF block that electronically isolates the first antenna and the second antenna from each other.
Integrated circuit device, information processing apparatus, memory management method for information storage device, mobile terminal apparatus, semiconductor integrated circuit device, and communication method using mobile terminal apparatus
A memory region on an IC card has a hierarchical structure. Each application allocated on the memory region is registered in a directory, and the memory region is managed in directory units. A personal identification code is set for each application and directory, and the access right is controlled in application units or directory units. If a mobile terminal is lost, the right to access each application in the IC card automatically disappears. Therefore, the right to access each application allocated to the memory region on the IC card is efficiently controlled.
Method for monitoring usage patterns and electronic device capable of implementing such a method
The invention relates to a method for controlling a transaction carried out between an electronic device comprising a secure memory and an external terminal by monitoring usage patterns of the electronic device, wherein a first and a second item of usage information are read when the transaction is carried out; a first list of data pairs is recorded on the secure memory, each of said pairs comprising the first and second (IU2) items of usage information; a second list of counters is recorded on the secure memory; an indicator for monitoring usage patterns of the electronic device is calculated on the basis of the first item of usage information, the second item of usage information, and/or a counter from the second list.
Secure element management and electronic device performing same and installation package
An electronic device includes a secure element in which at least one application package is installed and a processor for communicating with the secure element. The secure element further stores a list with which a part or all of identification information of the at least one application package is registered. The processor controls the secure element such that an application package indicated by the identification information registered with the list is uninstalled, in response to a specified event. Various other embodiments recognized from the specification are also possible.