Patent classifications
G06Q20/35765
Secure processor chip and terminal device
A processor chip including a memory controller, application processor and a communication processor, where the memory controller is configured to define an area of memory as secure memory, and allow only an access request with a security attribute to access the secure memory. The application processor is configured to invoke a secure application in a trusted execution environment, and write an instruction request for a secure element into the secure memory using the secure application. The communication processor is configured to read the instruction request from the secure memory in the trusted execution environment, and send the instruction request to the secure element. The application processor and the communication processor need to be in the trusted execution environment when accessing the secure memory, and access the secure memory only using the secure application.
Use of secure chips for storage of hashed data and private keys in hardware cryptowallets
A cryptowallet includes a microcontroller configured to communicate with a cryptowallet application running on a host; a touch display connected to the microcontroller and used to input a PIN code and a mnemonic seed for the cryptowallet for each cryptocurrency, and to output a destination address for a transaction and the mnemonic seed; a secure cryptoprocessor having storage and cryptographic logic. The storage stores a file system representing multiple cryptocurrencies. The file system is a tree that stores a private key for each cryptocurrency. The cryptowallet application is configured to communicate with a cryptocurrency network communication component, for carrying out transactions using the cryptocurrencies, that are authorized by using the private key upon providing the PIN code and the destination address of the transaction to the cryptoprocessor. The cryptographic logic implements cryptographic functions required by the cryptocurrencies. Connection between the microcontroller and the secure cryptoprocessor can be performed via the ISO7816 or NFC interfaces. The cryptowallet is configured to connect to the host using a USB connection.
Method for controlling dependency rules of objects updated in a microcircuit, and corresponding device
A checking device and method performed by a microcircuit for dependency rules for objects updated in the microcircuit. The device and method include steps for receiving (B3) a command for updating a first object (105) stored in the microcircuit, the command giving an updated value for the first object; and verifying (B4, B4) an updating rule (106) for the first object while taking account of the updated value for the first object. The device and method can be used in microcircuits that carry out transactions.
Cards & Documents
One 16 digits smart card shaped like a regular bank card in length and width with chip and swiping abilities which is divided into several different separate sectors. e.g. bank cards, credit cards, cash transactions, medical insurance usage and other personal documentation of information that are all stored on one smart card. This smart card is configured to hold financial information, general information, and documentation of a variety of various categories of different documents on its database. All parts can be accessible by one four-digit secret security code to ensure the safety of the card's information.
APPARATUS, SYSTEM, AND METHOD FOR OPERATING A DIGITAL TRANSACTION CARD
Apparatus (512, 514, 516, 520) on a Digital Transaction Card (DTC) (518), the apparatus (512, 514, 516, 520) including a Digital Transaction Processing Unit (DTPU) (520) operable for executing an instruction from a standard command protocol, wherein the DTC (518) is operable to store one or more scripts (504), each script (504) including one or more instructions from the standard command protocol, the DTC (518) further operable to cause the DTPU (520) to execute the one or more instructions.
Information processing apparatus and information processing method
Provided is an information processing apparatus including an access control unit configured to control access from an application to a common file system accessible from a plurality of applications. The access control unit in a case where contact communication is performed with respect to an external processor, controls access by using first identification information for specifying an application, the first identification information being associated with each of the plurality of applications, and in a case where contactless communication is performed via a contactless communication device capable of performing contactless communication with an external device, controls access by using second identification information for specifying an application related to contactless communication, the second identification information being associated with at least one application among the plurality of applications.
Method of operating an NFC device, the NFC device, and a communication system
A method for operating a first near field communication, NFC, device, wherein the NFC device comprises an NFC interface and a memory, the method comprising: i) receiving a request for a service from a second NFC device at the NFC interface, ii) allocating a first information from a first memory unit of the memory that is configured to take part in providing the service, iii) allocating a second information from a second memory unit that is not configured to take part in providing the service, and transferring the second information from the second memory unit to the first memory unit, hereby iv) transferring at least a part of the first information and/or at least a part of the second information virtually beyond the first memory unit, v) combining the first information and the second information into a message, and vi) providing the message to the second NFC device as a response to the request.
Security for mobile payment applications
A mobile computing device having at least one processor and at least one memory, together providing a first execution environment and a second execution environment logically isolated from the first execution environment, the mobile computing device comprising: a first application executable within the first execution environment; a second trusted application executable within the second execution environment; and a secure communications channel between the first application and the second trusted application, wherein the second trusted application is configured to generate one or more data items and to provide the one or more data items to the first application via the secure communications channel.
System for unlocking game play data on near field communications system for unlocking game play data on near field communications (NFC) chips to allow for game play on an electronic computing device that uses the game play data
Systems and methods are provided for unlocking game play data on Near Field Communications (NFC) chips to allow for game play using the game play data on the NFC chips.
METHOD OF OPERATING AN NFC DEVICE, THE NFC DEVICE, AND A COMMUNICATION SYSTEM
A method for operating a first near field communication, NFC, device, wherein the NFC device comprises an NFC interface and a memory, the method comprising: i) receiving a request for a service from a second NFC device at the NFC interface, ii) allocating a first information from a first memory unit of the memory that is configured to take part in providing the service, iii) allocating a second information from a second memory unit that is not configured to take part in providing the service, and transferring the second information from the second memory unit to the first memory unit, hereby iv) transferring at least a part of the first information and/or at least a part of the second information virtually beyond the first memory unit, v) combining the first information and the second information into a message, and vi) providing the message to the second NFC device as a response to the request.