Patent classifications
G06Q20/3576
Cards & Documents
One 16 digits smart card shaped like a regular bank card in length and width with chip and swiping abilities which is divided into several different separate sectors. e.g. bank cards, credit cards, cash transactions, medical insurance usage and other personal documentation of information that are all stored on one smart card. This smart card is configured to hold financial information, general information, and documentation of a variety of various categories of different documents on its database. All parts can be accessible by one four-digit secret security code to ensure the safety of the card's information.
METHODS AND SYSTEMS FOR SECURING AND UTILIZING A PERSONAL DATE STORE ON A MOBILE DEVICE
Methods and apparatus for securing access to an encrypted personal data store on a mobile device. In some embodiments, a universal integrated circuit card (UICC) processor receives, from a mobile device processor of a mobile device having an encrypted Personal Data Store (PDS), a PDS access request associated with a mobile application, then determines that access control rules are stored in at least one access control rules database and transmits to the mobile device processor, the access control rules governing access to the data in the encrypted PDS. The process also includes the UICC processor receiving a request for a symmetric shared secret and transmitting the symmetric shared secret to the mobile device processor for use in accessing the PID of the user stored in the encrypted PDS in accordance with the access control rules.
SYSTEMS AND METHODS FOR IMAGE CAPTURE VECTOR FORMAT LASERING ENGINE
A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector formatted visible information lasered onto its surface. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format. The systems and methods may receive a request to add a first plurality of visible information to a transaction card and capture an image of the first plurality of visible information. The systems and methods may also map the image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machine.
Systems and methods for image capture vector format lasering engine
A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector formatted visible information lasered onto its surface. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format. The systems and methods may receive a request to add a first plurality of visible information to a transaction card and capture an image of the first plurality of visible information. The systems and methods may also map the image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machine.
Information processing apparatus and method, recording medium, and program
Information processing apparatus and method, recording medium, and program are provided. An information processing apparatus includes the following elements. A receiver receives a command requesting for the execution of predetermined processing. A storage unit stores data and first information indicating, among a plurality of stages in a lifecycle of the information processing apparatus, the current stage determined by the stored data and second information indicating an executable command in the current stage, the executable command being determined for each of the plurality of stages. A determining unit determines on the basis of the first information and the second information whether the command received by the receiver is an executable command in the current stage.
System and method for transaction security enhancement
Various embodiments include a first detection being made that a first program residing on a device is requesting authentication. The first program resides in a first portion of the device. An authentication step can be performed by referencing a unique identifier accessible via a request sent by the first program to a second program residing on the device, where the second program resides in a second portion of the mobile device. The second portion has a greater level of security than the first portion (e.g. physical separation may exist between the first and second portions). Accordingly, integrity of the first program can be verified (e.g. an authentic, authorized version of a program is making a transaction request rather than an unauthorized version).
LOCAL CACHE-BASED IDENTIFICATION SYSTEM
An identification system uses a local cache for performing identifications. An identity system device may store identity information and identification information. An electronic device stores a cache of a portion of the identity information and a part of the identification information. The electronic device receives user input, determines an identity by comparing the user input to the cached identification information (such as by comparing a received digital representation of a biometric with cached biometric identification information), and performs an action using information in the cached identity information that is associated with the identity. The electronic device may update the identity information stored by the identity system device based on the action.
Mobile device containing contactless payment device
An apparatus such as a mobile phone includes a contactless smart card or payment device, where the smart card is intended for use in both commerce transaction payment and transit fare payment (or other venue access) environments. The payment device may function as both an electronic wallet for commerce transactions and as a transit system card, for access to and fare payment of transit services. Implementation of both functions may be achieved by use of a dynamic memory management system that permits data for both the payment and transit applications to be stored on the card, with the transit data and storage locations isolated from those used to store data intended for use in paying for commerce transactions. The transit application specific data may include access control data (keys, passwords, identification data) or data required for fare calculations (rates, historical data on system use), for example.
SECURE ELEMENT MANAGEMENT METHOD AND ELECTRONIC DEVICE PERFORMING SAME
An electronic device includes a secure element in which at least one application package is installed and a processor for communicating with the secure element. The secure element further stores a list with which a part or all of identification information of the at least one application package is registered. The processor controls the secure element such that an application package indicated by the identification information registered with the list is uninstalled, in response to a specified event. Various other embodiments recognized from the specification are also possible.
Implementation of an integrity-protected secure storage
An internal but not integrated security token is provided for a device which includes a first integrated circuitry including a secure processor. The security token is provided by a second integrated circuitry separate from the first circuitry. The second integrated circuitry includes a secure non-volatile storage. The secure processor communicates information to the second circuitry in a secure manner for the secure information to be securely stored in the secure non-volatile storage, and the second integrated circuitry communicates information stored in its secure non-volatile storage to the secure processor in a secure manner. Communications is secured by means of cryptography. The first integrated circuitry and the second integrated circuitry are internal parts of the device. An initialization method for distributing a secure key to be shared between the circuitries and to be used in cryptography is also disclosed.