Patent classifications
G06Q20/35765
INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM
Provided is an information processing apparatus including an access control unit configured to control access from an application to a common file system accessible from a plurality of applications. The access control unit in a case where contact communication is performed with respect to an external processor, controls access by using first identification information for specifying an application, the first identification information being associated with each of the plurality of applications, and in a case where contactless communication is performed via a contactless communication device capable of performing contactless communication with an external device, controls access by using second identification information for specifying an application related to contactless communication, the second identification information being associated with at least one application among the plurality of applications.
SYSTEMS AND METHODS FOR TRANSFERRING RESOURCE ACCESS
Systems and methods for transferring resource access from a sender to a recipient are disclosed that can allow a sender to specify an amount of a resource to provide access to (e.g., an amount of money or an amount of access rights), while still providing security for the sender's sensitive credential information (e.g., PAN and/or PIN). These systems and methods can allow a sender to transfer resource access from any location and at any time of the day. In the case of money transfers, the recipient can quickly and directly obtain the money from any ATM location associated with any bank and at any time of the day, even without a bank account.
Information processing apparatus, information processing method, and program
Provided is an information processing apparatus including an access control unit configured to control access from an application to a common file system accessible from a plurality of applications. The access control unit in a case where contact communication is performed with respect to an external processor, controls access by using first identification information for specifying an application, the first identification information being associated with each of the plurality of applications, and in a case where contactless communication is performed via a contactless communication device capable of performing contactless communication with an external device, controls access by using second identification information for specifying an application related to contactless communication, the second identification information being associated with at least one application among the plurality of applications.
Systems and methods for transferring resource access
Systems and methods for transferring resource access from a sender to a recipient are disclosed that can allow a sender to specify an amount of a resource to provide access to (e.g., an amount of money or an amount of access rights), while still providing security for the sender's sensitive credential information (e.g., PAN and/or PIN). These systems and methods can allow a sender to transfer resource access from any location and at any time of the day. In the case of money transfers, the recipient can quickly and directly obtain the money from any ATM location associated with any bank and at any time of the day, even without a bank account.
Non-interfering transactions
Embodiments relate to non-interfering transactions. An aspect includes receiving, by a first transaction, a conflicting remote access request from a requester, the remote access request being directed to a memory area that is owned as part of at least one of a transactional read set and transactional write set by the first transaction. Another aspect includes determining whether the requester is a second transaction that is indicated as a non-interfering transaction with respect to the first transaction. Another aspect includes, based on determining that the requester is indicated as a non-interfering transaction with the first transaction, handling the remote access request. Yet another aspect includes continuing execution of the first transaction and the second transaction after handling the remote access request.
Non-interfering transactions
Embodiments relate to non-interfering transactions. An aspect includes receiving, by a first transaction, a conflicting remote access request from a requester, the remote access request being directed to a memory area that is owned as part of at least one of a transactional read set and transactional write set by the first transaction. Another aspect includes determining whether the requester is a second transaction that is indicated as a non-interfering transaction with respect to the first transaction. Another aspect includes, based on determining that the requester is indicated as a non-interfering transaction with the first transaction, handling the remote access request. Yet another aspect includes continuing execution of the first transaction and the second transaction after handling the remote access request.
SYSTEM FOR UNLOCKING GAME PLAY DATA ON NEAR FIELD COMMUNICATIONS SYSTEM FOR UNLOCKING GAME PLAY DATA ON NEAR FIELD COMMUNICATIONS (NFC) CHIPS TO ALLOW FOR GAME PLAY ON AN ELECTRONIC COMPUTING DEVICE THAT USES THE GAME PLAY DATA
Systems and methods are provided for unlocking game play data on Near Field Communications (NFC) chips to allow for game play using the game play data on the NFC chips.
Method for controlling financial chip of payment device
Disclosed is a method for controlling a financial chip of a payment device, in which information for multiple cards is stored in a single USIM chip, to enable the payment device to use credit cards from multiple card companies as a payment means. The method includes: dividing storage of the memory of the financial chip into multiple sections and allocating a turn to each storage section; allocating a first turn to the first card company server and recording information on the credit card issued by the first card company server, an application for financial transactions, and an identifier for the application when the first card company server and the second card company server sequentially make a request for the record of credit card information to the financial chip; and providing card arrangement information including information on the first turn and a second turn to the second card company server.
METHOD FOR USING AND MAINTAINING USER DATA STORED ON A SMART CARD
In a method for using and maintaining user data stored on a smart card, a smart card receives a user data request for the user data stored on the smart card. The smart card determines whether the user data request is a data maintenance request or a data use request. A data maintenance request is for modifying user data stored on the smart card. A data use request is for read only access to user data stored on the smart card. The smart card uses a first process to determine whether to allow the user data request when the user data request is determined to be a data maintenance request. The smart card uses a second process, different from the first method, to determine whether to allow the user data request when the user data request is determined to be a data use request.
Universal Integrated Circuit Card Having A Virtual Subscriber Identity Module Functionality
Universal integrated circuit card (UICC) having a virtual subscriber identity module functionality is disclosed. A wireless transmit/receive unit (WTRU) comprises a mobile equipment (ME) configured to perform wireless communication and a UICC. The UICC is configured to perform security functionalities. The UICC supports multiple isolated domains including UICC issuer's domain. Each domain is owned by a separate owner so that each owner stores and executes an application on the UICC under a control of an UICC issuer and the UICC issuer's domain controls creation and deletion of other domains and defines and enforces security rules for authorizing third parties to have an access to the domains. The UICC is configured to verify integrity of operating system functions and applications stored on the UICC. The UICC is configured to control an access to information regarding applications according to security policies stored within the UICC.