Patent classifications
G06Q20/35765
Electronic device and method for processing secure information
An electronic device and a method for operating the electronic device are provided. The method includes obtaining first information in a first zone of the electronic device, extracting second information included in the first information in the first zone of the electronic device, and storing the second information in a second zone of the electronic device that has a higher level of security than a level of security of the first zone.
DIGITAL TRANSACTION APPARATUS, SYSTEM, AND METHOD WITH A VIRTUAL COMPANION CARD
Apparatus on a Digital Transaction Card (DTC) (222) operable in accordance with a standard command protocol, the apparatus including hardware operable with at least one application for executing one or more instructions from the standard command protocol; and software operable to store one or more software packages, at least one of the one or more software packages representing a Modified Virtual Card Profile (MVCP), the apparatus operable with the MVCP to cause the DTC(222) to adopt the personality associated with the MVCP.
Extra security element on cards to protect against fraud
Authenticating a secure element payment card includes transmitting a cold reset signal to the payment card and receiving an answer-to-reset message therefrom. The answer-to-reset message includes governing rules for performing a transaction, including a rule indicating that a secure data element is to be used to authenticate the payment card. The process also includes receiving payment account details for a payment account associated with the payment card. A payment authorization request message is transmitted to an interchange network and a card authentication request message is then received from the interchange network. The card authentication request message includes an encrypted instruction, which is transmitted to the secure element payment card. The secure data element is received from the payment card and a card authentication request response message is then transmitted to the interchange network. A payment authorization request response message is then received from the interchange network.
Systems and Methods for Providing Data Structure Access
Systems and methods are provided for providing data structure access. One exemplary system includes first and second data structures including first and second data, respectively, where at least some of the second data is disparate from the first data. First and second APIs are associated with the first and second data structures, respectively. And, an access engine computing device coupled to the first and second data structures is configured to receive a request, from a requestor, directed to the first and second data and call the first and second APIs to request the first and second data from the respective data structures. Upon receiving the first and second data, the computing device is configured to store the first and second data in memory and compile a data file including the data. The computing device is then configured to provide the data file to the requestor, in response to the request.
Method for optimising memory writing in a device
Provided is a method for optimising memory writing in a device implementing a cryptography module and a client module calling functions implemented by the cryptography module. The device includes a random access memory including a first memory zone that is secured and dedicated to the cryptography module and a second memory zone dedicated to the client module. When the client module calls a series of functions implemented by the cryptography module including a first function and at least one second function, with each second function executed following the first function or from a further second function and providing a runtime result added to a runtime result of the preceding series function, each runtime result is added to a value contained in a buffer memory allocated in the first memory. The buffer memory value is copied to the second memory zone following the execution of the last function of the series.
Method for using and maintaining user data stored on a smart card
In a method for using and maintaining user data stored on a smart card, a smart card receives a user data request for the user data stored on the smart card. The smart card determines whether the user data request is a data maintenance request or a data use request. A data maintenance request is for modifying user data stored on the smart card. A data use request is for read only access to user data stored on the smart card. The smart card uses a first process to determine whether to allow the user data request when the user data request is determined to be a data maintenance request. The smart card uses a second process, different from the first method, to determine whether to allow the user data request when the user data request is determined to be a data use request.
Systems and methods for transferring resource access
Systems and methods for transferring resource access from a sender to a recipient are disclosed that can allow a sender to specify an amount of a resource to provide access to (e.g., an amount of money or an amount of access rights), while still providing security for the sender's sensitive credential information (e.g., PAN and/or PIN). These systems and methods can allow a sender to transfer resource access from any location and at any time of the day. In the case of money transfers, the recipient can quickly and directly obtain the money from any ATM location associated with any bank and at any time of the day, even without a bank account.
Secure Processor Chip and Terminal Device
A processor chip including a memory controller, application processor and a communication processor, where the memory controller is configured to define an area of memory as secure memory, and allow only an access request with a security attribute to access the secure memory. The application processor is configured to invoke a secure application in a trusted execution environment, and write an instruction request for a secure element into the secure memory using the secure application. The communication processor is configured to read the instruction request from the secure memory in the trusted execution environment, and send the instruction request to the secure element. The application processor and the communication processor need to be in the trusted execution environment when accessing the secure memory, and access the secure memory only using the secure application.
Payment module, payment method, program, and information recording medium
Provided is a payment module capable of allowing a total amount of money dispersedly recharged for a plurality of kinds of prepaid values to be used for a payment regardless of which of the prepaid values is used for the payment. An IC chip (22) stores a plurality of kinds of electronic values, and subtracts an amount of money that is equal to or more than a difference between a balance of an electronic value of the plurality of kinds of electronic values that is used for a payment and a payment amount as a total from balances of electronic values of the plurality of kinds of electronic values that are not used for the payment. The IC chip (22) adds the subtracted amount of money to the balance of the electronic value to be used for the payment, and subtracts the payment amount from the balance after the addition.
METHOD FOR CONTROLLING DEPENDENCY RULES OF OBJECTS UPDATED IN A MICROCIRCUIT, AND CORRESPONDING DEVICE
A checking device and method performed by a microcircuit for dependency rules for objects updated in the microcircuit. The device and method include steps for receiving (B3) a command for updating a first object (105) stored in the microcircuit, the command giving an updated value for the first object; and verifying (B4, B4) an updating rule (106) for the first object while taking account of the updated value for the first object. The device and method can be used in microcircuits that carry out transactions.