Patent application number | Description | Published |
20150148400 | O/W-EMULSION-TYPE TOPICAL PHARMACEUTICAL COMPOSITIONS CONTAINING A RETINOID - O/W-emulsion-type topical pharmaceutical compositions including a retinoid are described. Also described, is a topical pharmaceutical composition including by way of an active pharmaceutical ingredient, a retinoid in a physiologically acceptable composition. Preparation methods and the use of the same in dermatology are also described. | 05-28-2015 |
20150150974 | TOPICAL COMPOSITIONS OF AQUEOUS GEL TYPE IN THE FORM OF A HOMOGENEOUS SUSPENSION OF AN ACTIVE PRINCIPLE OF THE RETINOID CLASS CONTAINING AT LEAST ONE HYDROPHOBIC SILICA - Aqueous-gel type topical compositions are described. The compositions can be in the form of a homogeneous suspension of an active principle of the class of retinoids including at least one hydrophobic silica, the active principle preferably having general formula (I), and more specifically being 3″-tert-butyl-4′-(2-hydroxy-ethoxy)-4″-pyrrolidin-1-yl-[1,1′3′,1″]-terphenyl-4-carboxylic acid. Also described, is the preparation mode thereof and the use of same in the treatment of dermatological conditions. | 06-04-2015 |
20150190371 | TOPICAL COMPOSITIONS IN THE FORM OF A GEL CONTAINING A PARTICULAR SOLUBILIZED RETINOID - A composition in the form of a gel, preferably hydroglycolic, is described. The composition can include in a physiologically acceptable medium, at least one particular retinoid. Also described, is a method for the preparation thereof and the cosmetic and dermatological use of the same. | 07-09-2015 |
Patent application number | Description | Published |
20090307139 | BIOMETRIC AUTHENTICATION OF MOBILE FINANCIAL TRANSACTIONS BY TRUSTED SERVICE MANAGERS - A method for authenticating a financial transaction at a point of sale (POS) includes storing an application program in a first secure element of a mobile phone. The application is configured to generate instruction codes to effect the financial transaction upon verification of a user's identity. The user's credentials are stored in a second SE of the phone, which is operable to verify the user's identity from a biometric trait of the user input to the phone and to generate data authenticating the financial transaction in response to the verification of the user's identity. At the POS, the user invokes the application and then inputs a biometric trait to the phone. The second SE verifies the user's identity, and upon verification, generates data authenticating the transaction. The financial transaction data, including the instruction codes and the authenticating data, are then transmitted from the phone to the POS. | 12-10-2009 |
20120173434 | BIOMETRIC AUTHENTICATION OF MOBILE FINANCIAL TRANSACTIONS BY TRUSTED SERVICE MANAGERS - A method for authenticating a financial transaction at a point of sale (POS) includes storing an application program in a first secure element of a mobile phone. The application is configured to generate instruction codes to effect the financial transaction upon verification of a user's identity. The user's credentials are stored in a second SE of the phone, which is operable to verify the user's identity from a biometric trait of the user input to the phone and to generate data authenticating the financial transaction in response to the verification of the user's identity. At the POS, the user invokes the application and then inputs a biometric trait to the phone. The second SE verifies the user's identity, and upon verification, generates data authenticating the transaction. The financial transaction data, including the instruction codes and the authenticating data, are then transmitted from the phone to the POS. | 07-05-2012 |
20140025520 | BIOMETRIC AUTHENTICATION OF MOBILE FINANCIAL TRANSACTIONS BY TRUSTED SERVICE MANAGERS - In one embodiment, a method comprises storing a biometric trait of a user in a data communication device of the user, comparing a biometric trait input into the device with the biometric trait stored in the device, generating a certificate authenticating the user within the device if the biometric trait input into the device matches the biometric trait stored in the device, and facilitating a financial transaction of the user using the certificate. | 01-23-2014 |
20150056957 | BIOMETRIC AUTHENTICATION OF MOBILE FINANCIAL TRANSACTIONS BY TRUSTED SERVICE MANAGERS - In one embodiment, a method comprises storing a biometric trait of a user in a data communication device of the user, comparing a biometric trait input into the device with the biometric trait stored in the device, generating a certificate authenticating the user within the device if the biometric trait input into the device matches the biometric trait stored in the device, and facilitating a financial transaction of the user using the certificate. | 02-26-2015 |
20150220932 | BIOMETRIC AUTHENTICATION OF MOBILE FINANCIAL TRANSACTIONS BY TRUSTED SERVICE MANAGERS - In one embodiment, a method comprises storing a biometric trait of a user in a data communication device of the user, comparing a biometric trait input into the device with the biometric trait stored in the device, generating a certificate authenticating the user within the device if the biometric trait input into the device matches the biometric trait stored in the device, and facilitating a financial transaction of the user using the certificate. | 08-06-2015 |
Patent application number | Description | Published |
20100306076 | Trusted Integrity Manager (TIM) - A system for use with a trusted service manager (TSM) and a mobile device having a subscriber unique identifying data, according to one embodiment, includes: a server in which the server validates an application against the unique and identifying data of the mobile device and provides the validated application for the mobile device; and a secure element (SE) acting as a client in which the SE is present in the mobile device as client; the validated application from the server is installed in the SE; and the SE is adapted to execute the validated application to perform a service process. The service process includes enablement of payment functions on the mobile device, in which enablement of payment functions includes: providing secure communication between the mobile device and the server; secure provisioning of a payment instrument on the mobile device, wherein authentication and verification for the payment instrument on the mobile device is provided by the server; and binding the payment instruments and the validated application to the mobile device to provide a strong ID management for enhanced user protection and system security and integrity. | 12-02-2010 |
20110162078 | DYNAMIC PATTERN INSERTION LAYER - Various methods and systems are provided for inserting a user-selected pattern below a main application display when sensitive information is being requested or to be communicated. The border of the main application layer may also be modified at this time, either with or without the underlying pattern. This visual change provides the user an assurance that the application or site is authentic and not a phishing attack. The user-selected patterns are stored in secure areas, such as a secure element on the user device or in a cloud accessible by the application or site. | 06-30-2011 |
20110264543 | REVERSE PAYMENT FLOW - Systems and methods for facilitating transactions using contactless proximity communication technology include information or payment flows that are reversed from the conventional sense in that information may flow in direction from a merchant via a consumer mobile device to a financial services provider (FSP). Such payment and information flows can be accomplished without needing to modify infrastructure—such as point-of-sale NFC readers, mobile handsets, or advertising tags and may provide “bridge solutions” for quickly implementing mobile proximity purchase payments. Embodiments provide for receiving some transaction information at a financial services provider in response to a contactless proximity communication that occurs between either a consumer proximity tag and a merchant device, consumer mobile device and merchant proximity tag, or consumer mobile device and merchant device, in which some of the transaction information flow is reverse; validating the transaction; sending payment confirmation to the merchant; and sending transaction confirmation to the consumer. | 10-27-2011 |
20130010957 | CRYPTOGRAPHIC SECURITY USING FUZZY CREDENTIALS FOR DEVICE AND SERVER COMMUNICATIONS - An approach to cryptographic security uses a “fuzzy” credential, in contrast to a “hard” credential, to eliminate cryptographic algorithmic repeatability on a device that may be subject to physical attacks. By eliminating repeatability performed at an algorithmic (e.g., gate or software) level, a device inherently lacks one of the fundamental setup assumptions associated with certain classes of side channel, fault injection, timing, and related attacks, thus helps to protect the system against such attacks while preserving the cryptographic security of the system. | 01-10-2013 |