Abstract:
Disclosed herein are digital wallets (100) comprising a body (102), a front screen (108), a back screen (302), and a pull-out card (402) having an electronic chip (404), wherein the front screen (108) and the back screen (302) display information regarding a plurality of cards, which information is stored on the digital wallet (100).
Abstract:
Die Erfindung betrifft ein Verfahren zum Bereitstellen und Prüfen der Gültigkeit eines virtuellen Dokuments (204) auf einem ersten Computersystem (152). Das virtuelle Dokument (204) wird mittels eines mobilen zweiten Computersystems (102) für das erste Computersystem (152) bereitgestellt. Das Verfahrenumfasst: - Empfangen einer passwortgeschützten Speicheradresse (110) einer ersten Datenbank (202),unter der das virtuelle Dokument (204) auslesbar ist, - Auslesen des virtuellen Dokuments(204), - Anzeigen des virtuellen Dokuments (204) auf einem Display (174) des ersten Computersystems (152), - Empfangen eines eindeutigen zweiten Identifikators (111) des mobilen zweiten Computersystems (102), - Berechnen eines dritten Identifikators unter Verwendung des empfangenen zweiten Identifikators (111) und eines Hashwerts des virtuellen Dokuments (204), - Identifizieren des Datenbankeintragsder zweiten Datenbank(212),in welchem ein erste Identifikator (214) einer ersten Paarung aus dem mobilen zweiten Computersystem (102) und dem ersten virtuellen Dokument (204) gespeichert ist, - Vergleichen des berechneten dritten Identifikators mit dem in dem identifizierten Datenbankeintrag gespeicherten ersten Identifikator (214).
Abstract:
This invention relates to a method for a first user (T-user) to delegate to at least a second user (UT-user) a right of access to an electronic service using a security token, a delegation code (T-CODE) being allocated to the second user (UT-user) under the control of the first user (T-user) and securely stored in the security token. The method comprises the steps of providing (111) by the second user the delegation code (T-CODE) to the security token using a user interface adapted to exchange data with the security token; verifying (112) by the security token that the delegation code (T-CODE) provided by the second user (UT-user) is similar to the delegation code which is securely stored into the security token; in case of positive verification, granting access (113) for the second user (UT-user) to the electronic service.
Abstract:
The present invention relates to an integrated circuit card (ICC) comprising a rewritable non-volatile memory (MEM1) and a buffer (G_BUFF), said rewritable non-volatile memory (MEM1) comprising a first context (CTX1) where a first Java Card TM application (App1) comprising first data (Dat1) is stored, wherein said integrated circuit card (ICC) is adapted to: store (STOR1) in a second context (CTX2) of said rewritable non-volatile memory (MEM1) a second Java Card TM application (App2) sent by a terminal (T); load (PUT_DAT1) the first Java Card TM application (App1) first data (Dat1) into said buffer (G_BUFF); extract (GET_DAT1) said first Java Card TM application (App1) first data (Dat1) from said buffer (G_BUFF) and store (STOR2) said first data (Dat1) into said second context (CTX2).
Abstract:
A system and method for object deletion in persistent memory using bitmap windows representing memory chunks. In accordance with an embodiment, the system can generally be used with computing environments (100) that use persistent memory, such as smart cards, Java Cards, and other resource-constrained environments. In accordance with an embodiment, the system comprises a processor or computational engine and a persistent memory for storage of software objects; and a data structure (142) which can include one or more memory bitmap windows (144), each of which represents a chunk (146,148,150) of addressable space in the persistent memory (140); wherein the system uses the one or more memory bitmap windows in deleting non-reachable objects from the persistent memory.
Abstract:
The invention is a method of loading an application in a secure device. The application comprises a first executable code, a static data and a personalized data. The method comprises the following steps of: - computing a signature of said first executable code, - seeking if the signature matches another signature corresponding to a second executable code of another application that has been previously loaded into the secure device, - in case of successful matching, storing the static data and the personalized data associated with a link to said second executable code.
Abstract:
L'invention concerne un procédé d'exécution d'une transaction sans contact de type à champ proche, comprenant des étapes consistant à: établir une communication à champ proche entre un terminal de transaction à champ proche (POS) et un processeur (PRC, HP3),transmettre une commande associée à un identifiant d'application (AID) du terminal au processeur. Le système d'exploitation du processeur recherche dans une table un identifiant d'instance (AID-IID) correspondant à l'identifiant d'application figurant dans la commande, et associé à un indicateur d'état spécifiant qu'une instance d'application ayant l'identifiant d'instance est à un état activable, et active l'instance d'application ayant l'identifiant d'instance trouvé dans la table, en lui transmettant la commande, l'instance d'application une fois activée exécutant une transaction à champ proche avec le terminal de transaction.
Abstract:
A card, such as a credit or identification card, including an authenticating element for authenticating the card with a service provider, a fingerprint reader integral with the card for reading a fingerprint provided by a user of the card, and a processing element for comparing the fingerprint provided by the user to a fingerprint of an owner of the card to confirm that the user is the owner. In one variation, there is also provided a means for determining whether an object presented to the fingerprint reader is a finger of the user presenting the card.
Abstract:
Embodiments are directed towards employing a non-repudiation process for consumer credit requests based on an affirmative authentication of a one-time-pin ("OTP") generated from a consumer biometric smartcard. The biometric smartcard may authenticate biometric information (e.g. fingerprint, facial image, iris image, or the like) of the consumer based on biometric templates stored on the biometric smartcard. In at least some of the various embodiments, the OTP may be authenticated by an identity authority, such that an associated credit request to a provider may be authenticated. In some embodiments, the provider may request and utilize a credit report for an authentic credit request to determine whether or not the consumer has an acceptable credit rating. If the consumer has an acceptable credit rating, then the provider may provide credit to the consumer.