Patent application number | Description | Published |
20090215489 | Method and Device for Managing Applications of a Mobile Terminal - A method and system for managing a set of applications stored on a mobile terminal, comprising an access to said set of applications enabling at least one specific function to be accessed by at least one application using an application manager. | 08-27-2009 |
20100013606 | METHOD FOR STORING DATA AS WELL AS A TRANSPONDER, A READ/WRITE-DEVICE, A COMPUTER READABLE MEDIUM INCLUDING A PROGRAM ELEMENT AND SUCH A PROGRAM ELEMENT ADAPTED TO PERFORM THIS METHOD - A method for storing or reading data in a memory array of a transponder and a corresponding transponder, read/write device and program element is described. Therein, a data structure for storing data within the memory array is defined by a predetermined protocol. The data structure comprises: a header data block including predefined header data; an application data block for storing application data; a memory control data block including a reservation indicator for indicating a reserved partial memory area of the memory array where, in accordance with the predetermined protocol, application data cannot be read or written by a protocol compliant reader device. The method for storing data comprises storing additional application data in the reserved partial memory area. Thereby, memory areas which, according to the predetermined protocol, are not used can be used for new applications, data can be hidden in these areas such that they can not be read by protocol compliant reader devices and the data structure read or written by the method of the invention is compatible with the former predetermined protocol. | 01-21-2010 |
20100017570 | METHOD FOR STORING DATA AS WELL AS A TRANSPONDER, A READ/WRITE-DEVICE, A COMPUTER READABLE MEDIUM INCLUDING A PROGRAM ELEMENT AND SUCH A PROGRAM ELEMENT ADAPTED TO PERFORM THIS METHOD - A method for storing or reading data in a memory array of a transponder and a corresponding transponder, read/write device and program element is described. Therein, a data file system for storing data within the memory array is defined by a predetermined protocol. The data structure comprises: a capability container file containing management data and an application data file for storing application data. The capability container file includes an application data file control data block containing information to control the application data file. The application data file includes an application data length indicator indicating a memory size of first application data stored in the application data file in compliance with the predetermined protocol. The method for storing additional data comprises: checking whether a memory size of the application data file is larger than the memory size indicated by the application data length indicator; and storing second application data in a partial memory area of the application data file not occupied by the first application data. Thereby, memory areas which, according to the predetermined protocol, are not used can be used for new applications, data can be hidden in these areas such that they can not be read by protocol compliant reader devices and the data structure read or written by the method of the invention is compatible with the former predetermined protocol. | 01-21-2010 |
20100180321 | SECURITY SYSTEM AND METHOD FOR SECURING THE INTEGRITY OF AT LEAST ONE ARRANGEMENT COMPRISING MULTIPLE DEVICES - In order to provide a security system ( | 07-15-2010 |
20110107095 | SYSTEM AND METHOD FOR OBTAINING AN AUTHORIZATION KEY TO USE A PRODUCT - A system and method for obtaining an authorization key to use a product utilizes a secured product identification code, which includes a serial number and at least one code that is generated based on a cryptographic algorithm. | 05-05-2011 |
20110145586 | INTEGRATED CIRCUIT AND SYSTEM FOR INSTALLING COMPUTER CODE THEREON - An integrated circuit | 06-16-2011 |
20110241835 | TAG COMMUNICATION DEVICES - A contactless tag reader device comprises upper and lower electrodes which together define a tag location zone between them in which multiple tags can be placed. The lower electrode and the upper electrode are offset from each other such that they substantially do not overlap. This structure is used to sandwich tags vertically between two horizontally (laterally) offset reader electrodes. This enables power coupling and data transfer using capacitive coupling. | 10-06-2011 |
20120146773 | RANDOM-ID FUNCTION FOR SMARTCARDS - A method for low-level security based on the UID. In particular it enhances an RFID system by adding the ability to dynamically modify the UID of the smartcard or to randomly generate a new UID for the smartcard. | 06-14-2012 |
20120159105 | PARTITIONING THE NAMESPACE OF A CONTACTLESS SMART CARD - Systems, methods, computer programs, and devices are disclosed herein for partitioning the namespace of a secure element in contactless smart card devices and for writing application data in the secure element using requests from a software application outside the secure element. The secure element is a component of a contactless smart card incorporated into a contactless smart card device. A control software application resident in the same or a different secure element provides access types and access bits, for each access memory block of the secure element namespace, thereby portioning the namespace into different access types. Further, a software application outside the secure element manages the control software application by passing commands using a secure channel to the secure element, thereby enabling an end-user of the contactless smart card device or a remote computer to control the partitioning and use of software applications within the secure element. | 06-21-2012 |
20120159195 | WRITING APPLICATION DATA TO A SECURE ELEMENT - Systems, methods, computer programs, and devices are disclosed herein for partitioning the namespace of a secure element in contactless smart card devices and for writing application data in the secure element using requests from a software application outside the secure element. The secure element is a component of a contactless smart card incorporated into a contactless smart card device. A control software application resident in the same or a different secure element provides access types and access bits, for each access memory block of the secure element namespace, thereby portioning the namespace into different access types. Further, a software application outside the secure element manages the control software application by passing commands using a secure channel to the secure element, thereby enabling an end-user of the contactless smart card device or a remote computer to control the partitioning and use of software applications within the secure element. | 06-21-2012 |
20130105580 | METHOD FOR STORING DATA AS WELL AS TRANSPONDER, A READ/WRITE-DEVICE, A COMPUTER READABLE MEDIUM INCLUDING A PROGRAM ELEMENT AND SUCH A PROGRAM ELEMENT ADAPTED TO PERFORM THIS METHOD | 05-02-2013 |
20130111207 | WRITING APPLICATION DATA TO A SECURE ELEMENT | 05-02-2013 |
20130132687 | METHOD FOR STORING DATA AS WELL AS A TRANSPONDER, A READ/WRITE-DEVICE, A COMPUTER READABLE MEDIUM INCLUDING A PROGRAM ELEMENT AND SUCH A PROGRAM ELEMENT ADAPTED TO PERFORM THIS METHOD - A method for storing or reading data in a memory array of a transponder and a corresponding transponder, read/write device and program element is described. Therein, a data file system for storing data within the memory array is defined by a predetermined protocol. The method for storing additional data includes checking whether a memory size of the application data file is larger than the memory size indicated by the application data length indicator; and storing second application data in a partial memory area of the application data file not occupied by the first application data. Thereby, memory areas which, according to the predetermined protocol, are not used can be used for new applications, data can be hidden in these areas such that they can not be read by protocol compliant reader devices and the data structure read or written by the method of the invention is compatible with the former predetermined protocol. | 05-23-2013 |
20130145455 | METHOD FOR ACCESSING A SECURE STORAGE, SECURE STORAGE AND SYSTEM COMPRISING THE SECURE STORAGE - It is described a method for accessing a secure storage of a mobile device, the method comprising: providing a generic interface for accessing the secure storage; accessing the secure storage using the generic interface by a first application of the mobile device; accessing the secure storage using the generic interface by a second application of the mobile device. Further, a corresponding secure electronic storage and a system is described. | 06-06-2013 |
20140215166 | APPARATUS FOR STORING/READING DATA IN A MEMORY ARRAY OF A TRANSPONDER - An apparatus for storing or reading data in a memory array of a transponder and a corresponding transponder, read/write device and program element is described. Therein, a data file system for storing data within the memory array is defined by a predetermined protocol. The storing additional data includes checking whether a memory size of the application data file is larger than the memory size indicated by the application data length indicator; and storing second application data in a partial memory area of the application data file not occupied by the first application data. Thereby, memory areas which, according to the predetermined protocol, are not used can be used for new applications, data can be hidden in these areas such that they can not be read by protocol compliant reader devices and the data structure read or written is compatible with the former predetermined protocol. | 07-31-2014 |
20140340195 | ELECTRONIC LOCK, LOCKING SYSTEM, METHOD OF OPERATING AN ELECTRONIC LOCK, COMPUTER PROGRAM PRODUCT - According to an aspect of the invention, an electronic lock is conceived, being adapted to harvest energy from a radio frequency (RF) connection established between a mobile device and said electronic lock, further being adapted to use the harvested energy for processing an authorization token received via said RF connection from the mobile device, and further being adapted to use the harvested energy for controlling an unlocking switch in dependence on a result of said processing. | 11-20-2014 |
20150074400 | SYSTEM AND METHOD FOR OBTAINING AN AUTHORIZATION KEY TO USE A PRODUCT - A system and method for obtaining an authorization key to use a product utilizes a secured product identification code, which includes a serial number and at least one code that is generated based on a cryptographic algorithm. | 03-12-2015 |