US20040236680A1 - Method and apparatus for displaying embedded chip states and embedded chip end-user application states - Google Patents

Method and apparatus for displaying embedded chip states and embedded chip end-user application states Download PDF

Info

Publication number
US20040236680A1
US20040236680A1 US10/443,680 US44368003A US2004236680A1 US 20040236680 A1 US20040236680 A1 US 20040236680A1 US 44368003 A US44368003 A US 44368003A US 2004236680 A1 US2004236680 A1 US 2004236680A1
Authority
US
United States
Prior art keywords
application
user profile
user
smartcard
command
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/443,680
Inventor
Vincenzo Luoffo
Craig Fellenstein
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US10/443,680 priority Critical patent/US20040236680A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DI LUOFFO, VINCENZO VALENTINO, FELLENSTEIN, CRAIG WILLIAM
Publication of US20040236680A1 publication Critical patent/US20040236680A1/en
Application status is Abandoned legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/102Bill distribution or payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/355Personalisation of cards for use
    • G06Q20/3552Downloading or loading of personalisation data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • G06Q20/3572Multiple accounts on card

Abstract

A method and apparatus for managing applications installed on a smartcard. The invention comprises a Smartcard Management Program (SMP), a User Action Program (UAP), a User Command Program (UCP), an Application Status Update Program (ASUP), and a Card Status Update Program (CSUP). The SMP interfaces with smartcard communications system and accepts the user commands. The UAP obtains applications from external sources, updates the user profile, and transmits the user profile to the user for viewing on a graphical user interface. The UCP breaks the user commands into card actions and application actions and executes the card actions and application actions. The ASUP updates the user profile by changing the entry in an application name column, an application status column, a user action column, and an information column. The CSUP updates the user profile by changing the entry in the card status field.

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • The subject matter of the present application is related to U.S. patent application Ser. No. ______, attorney docket number AUS920030090US1, and U.S. patent application Ser. No. ______, attorney docket number AUS920030093, incorporated herein by reference.[0001]
  • FIELD OF THE INVENTION
  • The present invention is related generally to the organization of financial accounts. Specifically, the present invention is directed towards a method of managing smartcard applications. [0002]
  • BACKGROUND OF THE INVENTION
  • The use of credit cards in consumer transactions is well known in the art. A credit card is defined as an account card issued by a specific bank or financial institution for the purpose of purchasing goods and services on credit provided by the bank or financial institution. Credit cards typically have a preset spending limit and specific terms regarding payment terms, interest rates, grace periods, and other terms and conditions. However, the credit card itself does not contain any information other than the account number. In order to complete a transaction, the credit card account number is read from the card, sent to the bank or financial institution for verification of account and charge authorization, and returned to the vendor with approval for the transaction to proceed. The transaction process can be time consuming when the transaction occurs during peak purchasing periods or when the transaction takes place in a foreign country. The transaction may be stopped entirely if the vendor is unable to establish communications with the bank. Moreover, credit cards apply to a single account. In other words, the bank or financial institution must issue one credit card to the consumer for every account, requiring the consumer to carry multiple credit cards when the consumer has more than one account. Therefore, a need exists for a credit card that can be used for multiple accounts. [0003]
  • Debit cards are also well known in the art. With a debit card the consumer spends money already deposited in an account, rather than creating a credit account that will be paid at some later time. Debit cards are frequently used with deposit accounts such as checking, savings, and money market accounts. Unfortunately, like credit cards, debit cards card only contain a single account number. The vendor must still authorize the transaction through a communications network in order for the transaction to proceed, and the debit card can only be used for transactions with a single account. Therefore, a need exists for a debit card that can be used for multiple accounts. [0004]
  • A smartcard is one solution to the problems encountered with traditional credit and debit cards. A smartcard is a card, sized similarly to a credit card, which contains a processor and a memory. A smartcard is more advantageous than a credit card in that the smartcard can store and update account information within the smartcard memory. Storing and updating the account information within the smartcard memory is advantageous because charge authorization can be obtained directly from the card itself rather than through communications with the bank or financial institution. Moreover, because the smartcard has the ability to store and update information, one smartcard can contain information regarding a plurality of accounts. The ability of the smartcard to store account information on a plurality of accounts eliminates the need for the consumer to carry a plurality of cards. Instead, the consumer can carry one smartcard that contains account information for the user's checking, savings, money market, and credit accounts. [0005]
  • Moreover, smartcards contain additional flexibility because a user can add various applications onto their smartcard. One example of an application for a smartcard is a health care application. In a health care application, a smartcard may contain the user's heath insurance information so that the user's doctor can scan the smartcard and receive the patient's updated medical and insurance information, thereby streamlining the information exchange between the doctor, the patient, and the insurer. A similar application can be added to the smartcard for prescription drugs so that the doctor can use the card to know the status of the user's prescriptions. [0006]
  • Another example of an application is an airline frequent flyer application. In the frequent flyer application, the smartcard contains the user's frequent flyer information such as the account number, mileage balance, status level, and so forth. When the user purchases air travel with the smartcard, the frequent flyer information is automatically connected to the travel information, streamlining the exchange of information between the user and the airline. [0007]
  • However, the combination of a plurality of accounts and applications on a single smartcard creates new problems that were not previously encountered with credit or debit cards. One of these problems is efficient organization and maintenance of the accounts and applications on the smartcard. Smartcard users need to be able to add, modify, update, and delete accounts and applications as needed. Therefore, a need exists for an efficient method of organizing and maintaining accounts and applications associated with a smartcard. [0008]
  • The problem of smartcard management has been addressed by the prior art. U.S. Pat. No. 5,544,246 (the '246 patent) entitled “Smartcard Adapted for a Plurality of Service Providers and for Remote Installation of Same” discloses a method of organizing and limiting access to the files installed within a smartcard. U.S. Pat. No. 6,199,762 B1 (the '762 patent) entitled “Methods and Apparatus for Dynamic Smartcard Synchronization and Personalization” discloses an account maintenance system for a smartcard. What is needed beyond the '246 patent and the '762 patent is a method for organizing a plurality of accounts and applications associated with a smartcard. [0009]
  • Consequently, a need exists in the art for a method for organizing accounts and applications associated with a smartcard. Furthermore, a need exists for a method for adding, deleting, updating, and modifying accounts and applications associated with a smartcard. The need extends to an apparatus for implementing the aforementioned methods. [0010]
  • SUMMARY OF THE INVENTION
  • The present invention, which meets the needs identified above, is a method and apparatus for managing applications installed on a smartcard. The present invention can be embodied in a software program operable on a computer. In the software embodiment, the invention comprises a Smartcard Management Program (SMP), a User Action Program (UAP), a User Command Program (UCP), an Application Status Update Program (ASUP), and a Card Status Update Program (CSUP). The SMP interfaces with smartcard communications system and accepts the user commands. The UAP obtains applications from external sources, updates the user profile, and transmits the user profile to the user for viewing on a graphical user interface (GUI). [0011]
  • The UCP breaks the user commands into card actions and application actions and executes the card actions and application actions. Possible card actions include updating the PIN. Possible application actions include adding, installing, personalizing, updating, and deleting an application. [0012]
  • The ASUP updates the user profile by changing the entry in an application name column, an application status column, a user action column, and an information column. Possible application states include without limitation: new, downloaded, installed, ready, update available, blocked, unblocked and personalized. An application is new when the application is available to the user. An application is downloaded when the user has downloaded the compressed data file for the application to the smartcard. An application is installed when the user has installed the compressed data file. An application is personalized when it has been properly set up by the user, possibly including registration. An application is ready when it is ready to be used. An application has an update available when there is a downloadable update available for the application. An application is blocked when the application issuer or the smartcard issuer has temporarily blocked the application. An application issuer or smart card issuer can also unblock an application. [0013]
  • The CSUP updates the user profile by changing the entry in the card status field. Possible card states include without limitation: terminated, updated PIN, and locked. The card is terminated when the smartcard issuer blocks all activity on the smartcard, such as when the smartcard is lost or stolen. The PIN needs to be updated when the smartcard issuer resets the PIN, possibly for security reasons. The card is locked when the smartcard issuer wants to temporarily block activity on the smartcard, possibly to affirm that the activity on the card is not fraudulent. [0014]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself, however, as well as a preferred mode of use, further objectives and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawings, wherein: [0015]
  • FIG. 1 is an illustration of the communications system associated with a smartcard; [0016]
  • FIG. 2 is an illustration of the flow of information between the smartcard, the chip management system (CMS), and the client card system (CCS); [0017]
  • FIG. 3 is an illustration of the flow of information between the smartcard user, the CMS, an external server, and the CSS; [0018]
  • FIG. 4 is an illustration of a computer memory containing the computer program embodiment of the present invention; [0019]
  • FIG. 5 is a flowchart of the logic of the Smartcard Management Program (SMP) of the present invention; [0020]
  • FIG. 6 is a flowchart of the logic of the User Action Program (UAP) of the present invention; [0021]
  • FIG. 7 is a flowchart of the logic of the User Command Program (UCP) of the present invention; [0022]
  • FIG. 8 is a flowchart of the Application Status Update Program (ASUP) of the present invention; [0023]
  • FIG. 9 is a flowchart of the Card Status Update Program (CSUP) of the present invention; and [0024]
  • FIG. 10 is an illustration of the display of the graphical user interface (GUI) on the CSS associated with the present invention.[0025]
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • “Application issuer” shall have the same meaning herein as the term “Application Provider” (AP). [0026]
  • “Chip” means a processor and a memory contained within a smart card wherein the processor is connected to the memory and is capable of wired or wireless communication with a card reader or card reader/writer. [0027]
  • “Chip Information Number” (CIN) means a unique number assigned to each individual chip. The CIN can be used to identify the correct smartcard user when used in conjunction with a PIN. [0028]
  • “Chip Management System” (CMS) means a system that manages the lifecycle of the chip including without limitation storage and management of a card profile associated with a chipholder. [0029]
  • “Client Card System” means a computer having an interface for communication with a smart card. [0030]
  • “Computer” means a machine having a processor, a memory, and an operating system, capable of interaction with a user or other computer, and shall include without limitation: desktop computers, notebook computers, servers, personal digital assistants (PDAs), handheld computers, and cell phones. [0031]
  • “Display” means a visual depiction of a web page or computer program on a graphical user interface (GUI). [0032]
  • “Distribution Server” (DS) means a server that is a trusted node to the CMS that can obtain the chipholder profile from the CMS and package information from the chipholder profile into Application Protocol Data Units (APDU). The DS has an Intelligent Gateway mode where the user is directly interfacing with the server or a router mode where another device such as an automatic teller machine (ATM) is performing the interaction with the user. [0033]
  • “Input device” means a keyboard, mouse, trackball, touchpad, touchpoint device, stylus pen, touch screen, or any other type of device used to input data into a computer. [0034]
  • “Post-issuance data” means instructions and data for adding, modifying, or deleting data stored in a chip. One type of post issuance data is a user profile. [0035]
  • “Personal Information Number” (PIN) means a unique number assigned to each individual smartcard. The PIN can be used to identify the correct smartcard user when used in conjunction with a CIN. [0036]
  • “Security Server” (SS) means a server that provides for secure transmission of data from the CMS to the DS. [0037]
  • “Smartcard” means a card used for personal or business transactions comprising at least a processor and a memory capable of supporting an operating system, application programs, storage of chip holder personalization data, application data and other data as may be required by the issuer of a smart card. [0038]
  • “User interaction” means activating a button on a display by clicking on the button with a user input device or by touching the screen with a human hand or object; or activating a menu item on a display by clicking on the item with a user input device or by touching the screen with a human hand or object. [0039]
  • FIG. 1 is a diagram of one embodiment of a system [0040] 20 for carrying out operations associated with and providing post-issuance data to smartcard 32. Smartcard 32 is shown inserted into client card system (CSS) 30. CSS 30 may be, for example, a point-of-sale terminal, an automatic teller machine (ATM), or similar device. In general, smartcard 32 is capable of communicating with CSS 32. For example, smartcard 32 may have a set of electrically conductive contacts arranged on a surface, and CSS 30 may have a similarly arranged set of electrically conductive contacts located in a smart card interface. When smartcard 32 is inserted into CSS 30, corresponding members of the two sets of contacts may come into physical contact with one another. In addition, smartcard 32 is preferably capable of establishing and carrying out secure communications with CSS 30 as described in U.S. patent application Ser. No. ______ (attorney docket number AUS920030090).
  • In addition to CSS [0041] 30 and smartcard 32, system 20 also includes chip management system (CMS) 22, security server (SS) 24, distribution server (DS) 28, and communication network 26. As indicated in FIG. 1, CSS 30, CMS 22, SS 24, and DS 28 are connected to communication network 26. Communication network 26 includes, without limitation, the public switched telephone network (PSTN) and/or the Internet. CSS 30, CMS 22, SS 24, and DS 28 communicate with one another via communication network 26 to convey post-issuance data to smartcard 32 via a secure communication channel established within communication network 26.
  • One type of post-issuance data is the user profile described herein. FIG. 2 is an illustration of the process of CSS [0042] 30 obtaining user profile 40 from CMS 22. FIG. 2 is best understood when viewed in conjunction with Smartcard Management Program (SMP) 100 in FIG. 5. When smartcard 32 is inserted into CSS 30, CSS 30 reads CIN 34 from smartcard 32. CSS 30 then transmits CIN 34 to CMS 22. CMS 22 uses CIN 34 to access the user's profile 40. CMS 40 then transmits user profile 40 back to CSS 30, where CSS 30 displays user profile 40 on graphical user interface (GUI) 42. Display 600 in FIG. 10 is one possible illustration of the display of GUI 42.
  • As part of the present invention, the smartcard user can modify his user profile from any CSS. FIG. 3 is an illustration of the process of a user [0043] 46 modifying his user profile 40. FIG. 2 is best understood when viewed in conjunction with User Action Program (UAP) 200 in FIG. 6. User 46 views his user profile on GUI 42. User 46 then performs a user action on a input device 44. CSS 30 transforms the user action into an electronic user command and transmits the user command to CMS 22. CMS 22 uses the user command to modify user profile 40. If necessary, CMS 22 can send a request to external server 48 and external server 48 will send an application, an update, or similar data back to CMS 22. CMS 22 then sends the updated user profile back to CSS 30, where CSS 30 displays the updated user profile on GUI 42. This process illustrated in FIG. 3 ends when smartcard 32 is removed into CSS 30 or user 46 terminates the process by input into input device 44. Alternatively, the user profile can be installed on the smartcard and updates sent to a user profile archive in the CMS.
  • The internal configuration of a computer, including connection and orientation of the processor, memory, and input/output devices, is well known in the art. The present invention is a methodology that can be embodied in a computer program. Referring to FIG. 4, the methodology of the present invention is implemented on software by Smartcard Management Program (SMP) [0044] 100. SMP 100 comprises User Action Program (UAP) 200, User Command Program (UCP) 300, Application Status Update Program (ASUP) 400, and Card Status Update Program (CSUP) 500. SMP 100, UAP 200, UCP 300, ASUP 400, and CSUP 500 described herein can be stored within the memory of a computer on CMS 22, SS 24, DS 28, or the CSS 30 depicted in FIGS. 1, 2, and 3. Alternatively, SMP 100, UAP 200, UCP 300, ASUP 400, and/or CSUP 500 can be stored in an external storage device such as a removable disk or a CD-ROM. Memory 98 is illustrative of the memory within CMS 22 of FIGS. 1, 2, and 3. Memory 92 also contains user profile 40. The present invention may interface with user profile 40 through memory 98. As part of the present invention, the memory 98 can be configured with SMP 100, UAP 200, UCP 300, ASUP 400, and/or CSUP 500.
  • In alternative embodiments, SMP [0045] 100, UAP 200, UCP 300, ASUP 400, and/or CSUP 500 can be stored in the memory of other computers. This configuration allows the processor workload to be distributed across a plurality of processors instead of a single processor. Further configurations of SMP 100, UAP 200, UCP 300, ASUP 400, and/or CSUP 500 across various memories are known by persons skilled in the art.
  • Turning to FIG. 5, a flowchart of the logic of SMP [0046] 100 is illustrated. SMP 100 is a program which runs while the smartcard is inserted into a CSS. SMP 100 starts (102) when the user inserts the smartcard into the CSS (104). Generally, the user must enter his PIN on the input device on the CSS in conjunction with inserting the smartcard into the CSS. The CSS then reads the CIN from the smartcard and transmits the CIN to the CMS (106). The CMS then uses the CIN to access the user profile (108). The CMS then transmits the user profile back to the CSS (110). The CSS then displays the user profile on the GUI (112). SMP 100 then makes a determination whether there is a user command (114). If there is a user command, SMP 100 runs UAP 200 (116) and returns to step 114. If at step 114 there is not a user command (i.e. the user has removed his smartcard from the CSS), SMP 100 ends (118).
  • Turning to FIG. 6, a flowchart of the logic of UAP [0047] 200 is illustrated. UAP 200 starts (202) when prompted by SMP 100. UAP 200 accepts the user command entered in SMP 100 (204) and directs the CSS to transmit the user command to the CMS (206). UAP 200 then makes a determination whether an application is available from an external source (208). If an application is available from an external source, UAP 200 obtains the application from the external source (210) and proceeds to step 212. If at step 208 an application is not available from an external source, UAP 200 proceeds directly to step 212. At step 212, UAP 200 runs UCP 300 (212). UAP 200 then runs ASUP 400 (214) and CSUP 500 (216). UAP 200 then directs the CMS to send the updated user profile to the CSS (218). The CSS then displays the updated user profile on the GUI (220). UAP 200 then ends (222).
  • Turning to FIG. 7, a flowchart of the logic of UCP [0048] 300 is illustrated. UCP 300 starts (302) when prompted by UAP 200. UCP 300 accepts the user command entered in SMP 100 (304). UCP 300 then makes a determination whether the user command is a card action or an application action (306). In other words, UCP 300 classifies user commands into commands concerning applications installed on the card and commands concerning the smartcard itself. If the command is a card action, then UCP 300 makes a determination whether the card action is a user command to update the PIN (308). If the user does not want to update the PIN, UCP 300 returns to step 306. If the user wants to update the PIN, the UCP 300 allows the user to update the PIN (310) and proceeds to step 332. Persons skilled in the art are aware of other card actions in addition to updating a PIN.
  • Returning to step [0049] 306, if the user command is an application action, then UCP 300 proceeds to step 312 where UCP 300 makes a determination whether the user command is to add an application (312). If the user command is to add an application, then UCP 300 adds the application to the user profile (314) and proceeds to step 332. In adding the application to the user profile, UCP 300 downloads the compressed application data file to the user profile and/or smartcard and adds the application name to the application name column (see FIG. 10). Returning to step 312, if the user does not want to add an application, UCP 300 proceeds to step 316 where UCP 300 makes a determination whether the user command is to install an application (316). If the user command is to install an application, UCP 300 installs the application (318) and proceeds to step 332. In installing the application, UCP 300 decompresses the compressed application data file and runs the install program associated with the application. Returning to step 316, if the user does not want to install an application, USP 300 proceeds to step 320 where UCP 300 makes a determination whether the user command is to personalize an application (320). If the user wants to personalize an application, then UCP 300 personalizes the application selected by the user (322) and proceeds to step 332. In personalizing the application, the user adds any necessary or optional data to the application to place the application in a state to perform a task. Personalizing an application can include registering the application.
  • Returning to step [0050] 320, if the user does not want to personalize the application, then UCP 300 makes a determination whether the user command is to update an application (324). If the user wants to update an application, then UCP 300 downloads the update from the applicable location, installs the update (326), and proceeds to step 332. Returning to step 324, if the user does not want to update the application, UCP 300 makes a determination whether the user wants to delete the application (328). If the user does not want to delete the application, UCP 300 returns to step 312. If the user wants to delete the application, UCP 300 deletes the application from the user profile (330) and proceeds to step 332. In deleting the application, UCP 300 removes the application from the user profile and/or the smartcard. Persons skilled in the art are aware of how to add, install, personalize, update, and delete an application from a smartcard and/or user profile. Persons skilled in the art are also aware of other application actions besides the ones described in steps 312 through 330. UCP 300 then updates the user profile (332) and ends (334).
  • Turning to FIG. 8, a flowchart of the logic of ASUP [0051] 400 is illustrated. ASUP 400 starts (402) when prompted by UAP 200. ASUP 400 uses the CIN to access the user profile (404). ASUP 400 then makes a determination whether there are any applications that can be installed on the user profile which are not already installed (406). If there are not any applications that can be installed on the user profile, ASUP 400 proceeds directly to step 414. If there are applications which can be installed, ASUP 400 adds the application name column of the user profile (see FIG. 10) (408). ASUP 400 then adds the “new” icon to the application status column (see FIG. 10) (410). ASUP 400 then adds the “download” button to the user actions column (see FIG. 10) (412). ASUP 400 then proceeds to step 414.
  • At step [0052] 414, ASUP 400 makes a determination whether any applications are saved on the user profile (414). If there are not any applications saved on the user profile, ASUP 400 proceeds to step 454. If there are applications saved on the user profile, ASUP 400 goes to the first application and makes a determination whether the application is downloaded (416). If the application is downloaded, ASUP 400 removes the “new” icon from the application status column and adds the “downloaded” icon to the application status column (418). ASUP 400 then removes the “download” button from the user action column and adds the “install” and “delete” buttons to the user action column (420). ASUP 400 then proceeds to step 422.
  • Returning to step [0053] 416, if the application is not downloaded, then ASUP 400 proceeds to step 422 where ASUP 400 makes a determination whether the application is installed (422). If the application is installed, ASUP 400 removes the “downloaded” icon from the application status column and adds the “installed” icon to the application status column (424). ASUP 400 then removes the “install” button from the user action column and adds the “personalize” button to the user action column (426). ASUP 400 then proceeds to step 428.
  • Returning to step [0054] 422, if the application is not installed, then ASUP 400 proceeds to step 428 where ASUP 400 makes a determination whether the application is personalized (428). If the application is personalized, ASUP 400 removes the “installed” icon from the application status column and adds the “ready” icon to the application status column (430). ASUP 400 then removes the “personalize” button from the user action column (432). ASUP 400 then proceeds to step 434.
  • Returning to step [0055] 428, if the application is not personalized, then ASUP 400 proceeds to step 434 where ASUP 400 makes a determination whether an update for the application is available (434). If an update for the application is available, ASUP 400 adds the “update available” icon to the application status column (436). ASUP 400 then adds the “update” button to the user action column (438). ASUP 400 then proceeds to step 440.
  • Returning to step [0056] 434, if an update for the application is not available, ASUP 400 proceeds to step 440 where ASUP 400 makes a determination whether the application is blocked (440). An application is blocked if the application issuer has stopped the user from using the particular application. Persons skilled in the art are aware of how to block an application on a smartcard. If the application is blocked, ASUP 400 adds the “blocked” icon to the application status column (442). ASUP 400 then hides the buttons in the user action column (444). ASUP 400 then proceeds to step 450.
  • Returning to step [0057] 440, if the application is not blocked, ASUP 400 proceeds to step 446 where ASUP 400 makes a determination whether the “blocked” icon is in the application status column (446). If the “blocked” icon is not in the application status column, ASUP 400 proceeds to step 450. If the “blocked” icon is in the application status column, ASUP 400 removes the “blocked” icon from the application status column and displays the user action buttons (448). ASUP 400 then proceeds to step 450.
  • At step [0058] 450, ASUP 400 makes a determination whether there is another application on the user profile (450). If there is another application on the user profile, ASUP 400 goes to the next application (452) and returns to step 416. If at step 450 there is not another application, ASUP 400 updates the user profile (454) and ends (456).
  • Turning to FIG. 9, a flowchart of the logic of CSUP [0059] 500 is illustrated. CSUP 500 starts (502) when prompted by UAP 200. CSUP 500 then uses the CIN to access the user profile (504). CSUP 500 then makes a determination whether the smartcard has been terminated (506). A smartcard has been terminated if the smartcard issuer has blocked all activity on the smartcard. A smartcard may be terminated if the smartcard is lost or stolen. Persons skilled in the art are aware of how to terminate a smartcard. If the smartcard has been terminated, CSUP 500 changes the card status to “card terminated” (508) and proceeds to step 520. If at step 506 the card has not been terminated, CSUP 500 makes a determination whether the PIN has been reset (510). A PIN has been reset when the smartcard issuer deletes an old PIN and requests that the user set a new PIN. Persons skilled in the art are aware of how to reset a PIN. If the PIN has been reset, CSUP 500 changes the card status to “update PIN” (512) and proceeds to step 520. If at step 510 the PIN has not been reset, CSUP 500 makes a determination whether the card is locked (514). A card is locked if the smartcard issuer wants to temporarily block the use of the card, but not terminate the card. Persons skilled in the art are aware of how to lock a smartcard. If the card is locked, CSUP 500 changes the card status to “card locked—call customer service for more information” (516) and proceeds to step 520. If at step 514 the card is not locked, CSUP 500 changes the card status to “ready” (518) and proceeds to step 520. At step 520, CSUP 500 updates the user profile (520) and ends (522).
  • FIG. 10 is one possible display [0060] 600 from GUI 42 depicted in FIGS. 2 and 3. Display 600 depicts the card status 602, which is modified by CSUP 500 in FIG. 9. Display 600 also depicts numerous applications 604 which can be modified by UCP 300 depicted in FIG. 7 and ASUP 400 depicted in FIG. 8. ASUP 400 makes reference to application name column 606, application status column 608, user action column 610, all of which are depicted in display 600. Display 600 also contains information column 612 which displays any additional information related to a particular application 604.
  • While the disclosed application for the present invention is within smartcards, this disclosure is not meant to be limiting in any way. The present invention can be alternatively embodied in wireless devices, home appliances, and the like. In fact, the present invention is advantageous whenever there is a need to organize various kinds of information. [0061]
  • With respect to the above description, it is to be realized that the optimum dimensional relationships for the parts of the invention, to include variations in size, materials, shape, form, function and manner of operation, assembly and use, are deemed readily apparent and obvious to one skilled in the art, and all equivalent relationships to those illustrated in the drawings and described in the specification are intended to be encompassed by the present invention. The novel spirit of the present invention is still embodied by reordering or deleting some of the steps contained in this disclosure. The spirit of the invention is not meant to be limited in any way except by proper construction of the following claims. [0062]

Claims (42)

What is claimed is:
1. A method for managing a plurality of applications comprising:
obtaining a chipholder identification number from a memory;
using the chipholder identification number to obtain a user profile;
transmitting the user profile to a graphical user interface; and
displaying data contained within the user profile on the graphical user interface.
2. The method of claim 1 further comprising:
accepting a command to add an application to the user profile; and
adding an application to the user profile.
3. The method of claim 1 further comprising:
accepting a command to delete an application from the user profile; and
deleting an application from the user profile.
4. The method of claim 1 further comprising:
accepting a command to install an application on the user profile; and
installing an application on the user profile.
5. The method of claim 1 further comprising:
accepting a command to personalize an application on the user profile; and
personalizing an application on the user profile.
6. The method of claim 1 further comprising:
accepting a command to download an application to the user profile; and
downloading an application to the user profile.
7. The method of claim 1 further comprising:
accepting a command to update an application on the user profile; and
updating an application on the user profile.
8. The method of claim 1 further comprising:
accepting a command to block an application on the user profile; and
blocking an application on the user profile.
9. The method of claim 1 wherein the memory is located on a smartcard.
10. The method of claim 9 further comprising:
accepting a command to terminate the smartcard; and
terminating the smartcard.
11. The method of claim 9 further comprising:
accepting a command to lock the smartcard; and
locking the smartcard.
12. The method of claim 1 further comprising:
accepting a command to reset a PIN; and
resetting the PIN.
13. The method of claim 1 wherein the memory is located on a wireless device.
14. The memory of claim 1 wherein the memory is located on an appliance.
15. A program product operable on a computer, said program product comprising:
a computer usable medium;
wherein the computer usable medium comprises instructions comprising:
instructions for obtaining a chipholder identification number from a memory;
instructions for using the chipholder identification number to obtain a user profile;
instructions for transmitting the user profile to a graphical user interface; and
instructions for displaying data contained within the user profile on the graphical user interface.
16. The program product of claim 15 further comprising:
instructions for accepting a command to add an application to the user profile; and
instructions for adding an application to the user profile.
17. The program product of claim 15 further comprising:
instructions for accepting a command to delete an application from the user profile; and
instructions for deleting an application from the user profile.
18. The program product of claim 15 further comprising:
instructions for accepting a command to install an application on the user profile; and
installing an application on the user profile.
19. The program product of claim 15 further comprising:
instructions for accepting a command to personalize an application on the user profile; and
instructions for personalizing an application on the user profile.
20. The program product of claim 15 further comprising:
instructions for accepting a command to download an application to the user profile; and
instructions for downloading an application to the user profile.
21. The program product of claim 15 further comprising:
instructions for accepting a command to update an application on the user profile; and
instructions for updating an application on the user profile.
22. The program product of claim 15 further comprising:
instructions for accepting a command to block an application on the user profile; and
instructions for blocking an application on the user profile.
23. The program product of claim 15 wherein the memory is located on a smartcard.
24. The program product of claim 23 further comprising:
instructions for accepting a command to terminate the smartcard; and
instructions for terminating the smartcard.
25. The program product of claim 23 further comprising:
instructions for locking the smartcard.
26. The program product of claim 23 further comprising:
instructions for locking the smartcard.
27. The program product of claim 23 further comprising:
instructions for resetting a PIN.
28. The program product of claim 15 wherein the memory is located on a wireless device.
29. The program product of claim 15 wherein the memory is located on an appliance.
30. A program product operable on a computer, said program product comprising:
a computer usable medium;
a smartcard management program installed on the computer readable medium; and
wherein the smartcard management program allows a user to manage a plurality of applications on a smartcard.
31. The program product of claim 30 wherein said smartcard management program accesses a user profile based on a chipholder identification number.
32. The program product of claim 30 wherein said smartcard management program further comprises:
a user action program; and
wherein the user action program transmits a user profile to a graphical user interface.
33. The program product of claim 30 wherein said smartcard management program further comprises:
a user command program; and
wherein the user command program executes a user command.
34. The program product of claim 30 wherein said smartcard management program further comprises:
an application status update program; and
wherein the application status update program updates an application name, application status, an application user action, or an application information for one of the applications.
35. The program product of claim 30 wherein said smartcard management program further comprises:
a card status update program; and
wherein the card status update program updates a status of the smartcard.
36. The program product of claim of claim 33 wherein the user command is to add an application.
37. The program product of claim of claim 33 wherein the user command is to delete an application.
38. The program product of claim of claim 33 wherein the user command is to update an application.
39. The program product of claim of claim 33 wherein the user command is to download an application.
40. The program product of claim of claim 33 wherein the user command is to install an application.
41. The program product of claim of claim 33 wherein the user command is to personalize an application.
42. The program product of claim of claim 33 wherein the user command is to update an application.
US10/443,680 2003-05-22 2003-05-22 Method and apparatus for displaying embedded chip states and embedded chip end-user application states Abandoned US20040236680A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/443,680 US20040236680A1 (en) 2003-05-22 2003-05-22 Method and apparatus for displaying embedded chip states and embedded chip end-user application states

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US10/443,680 US20040236680A1 (en) 2003-05-22 2003-05-22 Method and apparatus for displaying embedded chip states and embedded chip end-user application states
CN 200410044780 CN100421100C (en) 2003-05-22 2004-05-18 Method and apparatus for displaying embedded chip states and embedded chip end-user application states
US12/491,150 US7814010B2 (en) 2003-05-22 2009-06-24 Method and apparatus for displaying embedded chip states and embedded chip end-user application states

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/491,150 Continuation US7814010B2 (en) 2003-05-22 2009-06-24 Method and apparatus for displaying embedded chip states and embedded chip end-user application states

Publications (1)

Publication Number Publication Date
US20040236680A1 true US20040236680A1 (en) 2004-11-25

Family

ID=33450481

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/443,680 Abandoned US20040236680A1 (en) 2003-05-22 2003-05-22 Method and apparatus for displaying embedded chip states and embedded chip end-user application states
US12/491,150 Expired - Fee Related US7814010B2 (en) 2003-05-22 2009-06-24 Method and apparatus for displaying embedded chip states and embedded chip end-user application states

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/491,150 Expired - Fee Related US7814010B2 (en) 2003-05-22 2009-06-24 Method and apparatus for displaying embedded chip states and embedded chip end-user application states

Country Status (2)

Country Link
US (2) US20040236680A1 (en)
CN (1) CN100421100C (en)

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060036547A1 (en) * 2004-08-10 2006-02-16 Hiroshi Yasuhara Authentication system, card and authentication method
US20060291700A1 (en) * 2005-06-08 2006-12-28 Ogram Mark E Internet signature verification system
US20090044012A1 (en) * 2001-07-10 2009-02-12 Xatra Fund Mx, Llc Rf transaction authentication using a random number
US20090079546A1 (en) * 2001-07-10 2009-03-26 Xatra Fund Mx, Llc Dna sample data in a transponder transaction
US20090106157A1 (en) * 2001-07-10 2009-04-23 Xatra Fund Mx, Llc Funding a Radio Frequency Device Transaction
US20090112627A1 (en) * 2007-10-31 2009-04-30 Health Record Corporation Method and System for Creating, Assembling, Managing, Utilizing, and Securely Storing Portable Personal Medical Records
US20090119220A1 (en) * 2001-07-10 2009-05-07 Xatra Fund Mx, Llc Authorized sample receiver
WO2009156414A1 (en) * 2008-06-25 2009-12-30 Gemalto Sa Identifier calculation method for web services
US7668750B2 (en) 2001-07-10 2010-02-23 David S Bonalle Securing RF transactions using a transactions counter
US7705732B2 (en) 2001-07-10 2010-04-27 Fred Bishop Authenticating an RF transaction using a transaction counter
US7725427B2 (en) 2001-05-25 2010-05-25 Fred Bishop Recurrent billing maintenance with radio frequency payment devices
US7746215B1 (en) 2001-07-10 2010-06-29 Fred Bishop RF transactions using a wireless reader grid
US7814332B2 (en) 2001-07-10 2010-10-12 Blayn W Beenau Voiceprint biometrics on a payment device
US20100312709A1 (en) * 2009-06-05 2010-12-09 Dynamic Card Solutions International Payment application pin data self-encryption
US20100308110A1 (en) * 2009-06-05 2010-12-09 Dynamic Solutions International Smart card pin management via an unconnected reader
US20100325039A1 (en) * 2009-04-28 2010-12-23 Mastercard International Incorporated Apparatus, method, and computer program product for encoding enhanced issuer information in a card
US7889052B2 (en) 2001-07-10 2011-02-15 Xatra Fund Mx, Llc Authorizing payment subsequent to RF transactions
WO2011033030A1 (en) * 2009-09-17 2011-03-24 Giesecke & Devrient Gmbh Method for installing and configuring applications on a portable data carrier
US7988038B2 (en) 2001-07-10 2011-08-02 Xatra Fund Mx, Llc System for biometric security using a fob
US8049594B1 (en) 2004-11-30 2011-11-01 Xatra Fund Mx, Llc Enhanced RFID instrument security
USRE43157E1 (en) 2002-09-12 2012-02-07 Xatra Fund Mx, Llc System and method for reassociating an account number to another transaction account
USRE43460E1 (en) 2000-01-21 2012-06-12 Xatra Fund Mx, Llc Public/private dual card system and method
US8240558B2 (en) 2008-01-15 2012-08-14 Aristocrat Technologies Australia Pty Limited Method of processing a user data card, an interface module and a gaming system
US8279042B2 (en) 2001-07-10 2012-10-02 Xatra Fund Mx, Llc Iris scan biometrics on a payment device
US8289136B2 (en) 2001-07-10 2012-10-16 Xatra Fund Mx, Llc Hand geometry biometrics on a payment device
US20140040298A1 (en) * 2012-08-01 2014-02-06 Fujitsu Limited Apparatus and method for starting up software
US8818907B2 (en) 2000-03-07 2014-08-26 Xatra Fund Mx, Llc Limiting access to account information during a radio frequency transaction
US8872619B2 (en) 2001-07-10 2014-10-28 Xatra Fund Mx, Llc Securing a transaction between a transponder and a reader
USRE45416E1 (en) 2001-07-10 2015-03-17 Xatra Fund Mx, Llc Processing an RF transaction using a routing number
US9024719B1 (en) * 2001-07-10 2015-05-05 Xatra Fund Mx, Llc RF transaction system and method for storing user personal data
US9032385B2 (en) 2011-12-28 2015-05-12 Lg Electronics Inc. Mobile terminal and control method thereof
USRE45615E1 (en) 2001-07-10 2015-07-14 Xatra Fund Mx, Llc RF transaction device
US20150296035A1 (en) * 2014-04-14 2015-10-15 Arris Enterprises, Inc. Real time key collection in device provisioning
US9454752B2 (en) 2001-07-10 2016-09-27 Chartoleaux Kg Limited Liability Company Reload protocol at a transaction processing entity
US9881294B2 (en) 2001-07-10 2018-01-30 Chartoleaux Kg Limited Liability Company RF payment via a mobile device
US10324781B2 (en) * 2013-04-25 2019-06-18 Feitian Technologies Co., Ltd. Method for managing application on card

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9959544B2 (en) * 2003-05-22 2018-05-01 International Business Machines Corporation Updating an application on a smart card and displaying an advertisement
EP2122540A1 (en) 2007-01-26 2009-11-25 LG Electronics Inc. Contactless interface within a terminal to support a contactless service
US20100061533A1 (en) * 2008-09-08 2010-03-11 At&T Intellectual Property I, L.P. Portable Telephony Profiles

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5544246A (en) * 1993-09-17 1996-08-06 At&T Corp. Smartcard adapted for a plurality of service providers and for remote installation of same
US5898783A (en) * 1996-11-14 1999-04-27 Lucent Technologies, Inc. System and method for employing a telecommunications network to remotely disable a SIM or smartcard
US6131090A (en) * 1997-03-04 2000-10-10 Pitney Bowes Inc. Method and system for providing controlled access to information stored on a portable recording medium
US6195700B1 (en) * 1998-11-20 2001-02-27 International Business Machines Corporation Application protocol data unit management facility
US6199762B1 (en) * 1998-05-06 2001-03-13 American Express Travel Related Services Co., Inc. Methods and apparatus for dynamic smartcard synchronization and personalization
US6419161B1 (en) * 1996-01-22 2002-07-16 Welcome Real-Time Apparatus and method for processing coded information stored on an integrated circuit card

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6038551A (en) 1996-03-11 2000-03-14 Microsoft Corporation System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer
US6101477A (en) 1998-01-23 2000-08-08 American Express Travel Related Services Company, Inc. Methods and apparatus for a travel-related multi-function smartcard
DE60003706D1 (en) 1999-10-15 2003-08-07 Ajit K Zacharias Secure card system for multiple applications
US7213254B2 (en) * 2000-04-07 2007-05-01 Koplar Interactive Systems International Llc Universal methods and device for hand-held promotional opportunities
US6901374B1 (en) * 2000-11-29 2005-05-31 Reynolds & Reynolds Holdings, Inc. Loyalty link method and apparatus for integrating customer information with dealer management information
US6745944B2 (en) 2001-06-20 2004-06-08 Capital One Financial Corporation System and method for identifying applications loaded in a smart card
GB2385186A (en) 2002-02-07 2003-08-13 Hewlett Packard Co User identification in electronic financial transactions
US20060032905A1 (en) 2002-06-19 2006-02-16 Alon Bear Smart card network interface device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5544246A (en) * 1993-09-17 1996-08-06 At&T Corp. Smartcard adapted for a plurality of service providers and for remote installation of same
US6419161B1 (en) * 1996-01-22 2002-07-16 Welcome Real-Time Apparatus and method for processing coded information stored on an integrated circuit card
US5898783A (en) * 1996-11-14 1999-04-27 Lucent Technologies, Inc. System and method for employing a telecommunications network to remotely disable a SIM or smartcard
US6131090A (en) * 1997-03-04 2000-10-10 Pitney Bowes Inc. Method and system for providing controlled access to information stored on a portable recording medium
US6199762B1 (en) * 1998-05-06 2001-03-13 American Express Travel Related Services Co., Inc. Methods and apparatus for dynamic smartcard synchronization and personalization
US6195700B1 (en) * 1998-11-20 2001-02-27 International Business Machines Corporation Application protocol data unit management facility

Cited By (61)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE43460E1 (en) 2000-01-21 2012-06-12 Xatra Fund Mx, Llc Public/private dual card system and method
US8818907B2 (en) 2000-03-07 2014-08-26 Xatra Fund Mx, Llc Limiting access to account information during a radio frequency transaction
US7725427B2 (en) 2001-05-25 2010-05-25 Fred Bishop Recurrent billing maintenance with radio frequency payment devices
US8284025B2 (en) 2001-07-10 2012-10-09 Xatra Fund Mx, Llc Method and system for auditory recognition biometrics on a FOB
US20090106157A1 (en) * 2001-07-10 2009-04-23 Xatra Fund Mx, Llc Funding a Radio Frequency Device Transaction
US9881294B2 (en) 2001-07-10 2018-01-30 Chartoleaux Kg Limited Liability Company RF payment via a mobile device
US20090119220A1 (en) * 2001-07-10 2009-05-07 Xatra Fund Mx, Llc Authorized sample receiver
US20090125401A1 (en) * 2001-07-10 2009-05-14 Xatra Fund Mx, Llc Biometric authorization of an rf transaction
US20090171851A1 (en) * 2001-07-10 2009-07-02 Xatra Fund Mx, Llc Registering a biometric for radio frequency transactions
US9454752B2 (en) 2001-07-10 2016-09-27 Chartoleaux Kg Limited Liability Company Reload protocol at a transaction processing entity
US9336634B2 (en) 2001-07-10 2016-05-10 Chartoleaux Kg Limited Liability Company Hand geometry biometrics on a payment device
US7668750B2 (en) 2001-07-10 2010-02-23 David S Bonalle Securing RF transactions using a transactions counter
US7705732B2 (en) 2001-07-10 2010-04-27 Fred Bishop Authenticating an RF transaction using a transaction counter
US20090079546A1 (en) * 2001-07-10 2009-03-26 Xatra Fund Mx, Llc Dna sample data in a transponder transaction
US9129453B2 (en) 2001-07-10 2015-09-08 Xatra Fund Mx, Llc DNA sample data in a transponder transaction
US20100201484A1 (en) * 2001-07-10 2010-08-12 Fred Bishop Rf transactions using a wireless reader grid
US7780091B2 (en) 2001-07-10 2010-08-24 Beenau Blayn W Registering a biometric for radio frequency transactions
US7814332B2 (en) 2001-07-10 2010-10-12 Blayn W Beenau Voiceprint biometrics on a payment device
USRE45615E1 (en) 2001-07-10 2015-07-14 Xatra Fund Mx, Llc RF transaction device
US9024719B1 (en) * 2001-07-10 2015-05-05 Xatra Fund Mx, Llc RF transaction system and method for storing user personal data
US8872619B2 (en) 2001-07-10 2014-10-28 Xatra Fund Mx, Llc Securing a transaction between a transponder and a reader
US7886157B2 (en) 2001-07-10 2011-02-08 Xatra Fund Mx, Llc Hand geometry recognition biometrics on a fob
US7889052B2 (en) 2001-07-10 2011-02-15 Xatra Fund Mx, Llc Authorizing payment subsequent to RF transactions
US8289136B2 (en) 2001-07-10 2012-10-16 Xatra Fund Mx, Llc Hand geometry biometrics on a payment device
US7988038B2 (en) 2001-07-10 2011-08-02 Xatra Fund Mx, Llc System for biometric security using a fob
US8009018B2 (en) 2001-07-10 2011-08-30 Xatra Fund Mx, Llc RF transactions using a wireless reader grid
US8016201B2 (en) 2001-07-10 2011-09-13 Xatra Fund Mx, Llc Authorized sample receiver
US20090044012A1 (en) * 2001-07-10 2009-02-12 Xatra Fund Mx, Llc Rf transaction authentication using a random number
US8066181B2 (en) 2001-07-10 2011-11-29 Xatra Fund Mx, Llc RF transaction authentication using a random number
US8074889B2 (en) 2001-07-10 2011-12-13 Xatra Fund Mx, Llc System for biometric security using a fob
US7746215B1 (en) 2001-07-10 2010-06-29 Fred Bishop RF transactions using a wireless reader grid
US8635165B2 (en) 2001-07-10 2014-01-21 Xatra Fund Mx, Llc Biometric authorization of an RF transaction
US9886692B2 (en) 2001-07-10 2018-02-06 Chartoleaux Kg Limited Liability Company Securing a transaction between a transponder and a reader
US8548927B2 (en) 2001-07-10 2013-10-01 Xatra Fund Mx, Llc Biometric registration for facilitating an RF transaction
US8294552B2 (en) 2001-07-10 2012-10-23 Xatra Fund Mx, Llc Facial scan biometrics on a payment device
US8279042B2 (en) 2001-07-10 2012-10-02 Xatra Fund Mx, Llc Iris scan biometrics on a payment device
USRE45416E1 (en) 2001-07-10 2015-03-17 Xatra Fund Mx, Llc Processing an RF transaction using a routing number
USRE43157E1 (en) 2002-09-12 2012-02-07 Xatra Fund Mx, Llc System and method for reassociating an account number to another transaction account
US20060036547A1 (en) * 2004-08-10 2006-02-16 Hiroshi Yasuhara Authentication system, card and authentication method
US8698595B2 (en) 2004-11-30 2014-04-15 QUALCOMM Incorporated4 System and method for enhanced RFID instrument security
US8264321B2 (en) 2004-11-30 2012-09-11 Xatra Fund Mx, Llc System and method for enhanced RFID instrument security
US8049594B1 (en) 2004-11-30 2011-11-01 Xatra Fund Mx, Llc Enhanced RFID instrument security
US9262655B2 (en) 2004-11-30 2016-02-16 Qualcomm Fyx, Inc. System and method for enhanced RFID instrument security
US20060291700A1 (en) * 2005-06-08 2006-12-28 Ogram Mark E Internet signature verification system
US8180654B2 (en) * 2007-10-31 2012-05-15 Health Record Corporation Method and system for creating, assembling, managing, utilizing, and securely storing portable personal medical records
US20090112627A1 (en) * 2007-10-31 2009-04-30 Health Record Corporation Method and System for Creating, Assembling, Managing, Utilizing, and Securely Storing Portable Personal Medical Records
US8240558B2 (en) 2008-01-15 2012-08-14 Aristocrat Technologies Australia Pty Limited Method of processing a user data card, an interface module and a gaming system
EP2141667A1 (en) * 2008-06-25 2010-01-06 Gemalto SA Identifier calculation method for web services
WO2009156414A1 (en) * 2008-06-25 2009-12-30 Gemalto Sa Identifier calculation method for web services
US8401964B2 (en) * 2009-04-28 2013-03-19 Mastercard International Incorporated Apparatus, method, and computer program product for encoding enhanced issuer information in a card
US20100325039A1 (en) * 2009-04-28 2010-12-23 Mastercard International Incorporated Apparatus, method, and computer program product for encoding enhanced issuer information in a card
US20100308110A1 (en) * 2009-06-05 2010-12-09 Dynamic Solutions International Smart card pin management via an unconnected reader
US20100312709A1 (en) * 2009-06-05 2010-12-09 Dynamic Card Solutions International Payment application pin data self-encryption
WO2011033030A1 (en) * 2009-09-17 2011-03-24 Giesecke & Devrient Gmbh Method for installing and configuring applications on a portable data carrier
US9575742B2 (en) 2011-12-28 2017-02-21 Microsoft Technology Licensing, Llc Mobile terminal and control method thereof
US9032385B2 (en) 2011-12-28 2015-05-12 Lg Electronics Inc. Mobile terminal and control method thereof
US9773038B2 (en) * 2012-08-01 2017-09-26 Fujitsu Limited Apparatus and method for starting up software
US20140040298A1 (en) * 2012-08-01 2014-02-06 Fujitsu Limited Apparatus and method for starting up software
US10324781B2 (en) * 2013-04-25 2019-06-18 Feitian Technologies Co., Ltd. Method for managing application on card
US20150296035A1 (en) * 2014-04-14 2015-10-15 Arris Enterprises, Inc. Real time key collection in device provisioning
US9912771B2 (en) * 2014-04-14 2018-03-06 Arris Enterprises Llc Real time key collection in device provisioning

Also Published As

Publication number Publication date
US7814010B2 (en) 2010-10-12
US20090255988A1 (en) 2009-10-15
CN100421100C (en) 2008-09-24
CN1573728A (en) 2005-02-02

Similar Documents

Publication Publication Date Title
AU768541B2 (en) System and method for recovering refundable taxes
US8515840B2 (en) Modular electronic wallet
US10169750B2 (en) Apparatus, systems and methods for wirelessly transacting financial transfers, electronically recordable authorization transfers, and other information transfers
US6295482B1 (en) Electronic newspaper vending machine
US7387238B2 (en) Customer enrollment in a stored value card program
US6018724A (en) Method and apparatus for authenticating on-line transaction data
US8433769B2 (en) System for providing transaction services to a plurality of user devices
AU2003218178B2 (en) A system and method for purchasing goods and services through data network access points over a point of sale network
US7765162B2 (en) Method and system for conducting off-line and on-line pre-authorized payment transactions
US5705798A (en) System and method for processing a customized financial transaction card
US7171686B1 (en) Operating system extension to provide security for web-based public access services
EP0766852B1 (en) Universal electronic transaction card and system and methods of conducting electronic transactions
CN101095162B (en) System and method for a secure transaction module
CA2893917C (en) Methods and apparatus for conducting electronic transactions
US7325725B2 (en) Stored value card account transfer system
US5815657A (en) System, method and article of manufacture for network electronic authorization utilizing an authorization instrument
US6199762B1 (en) Methods and apparatus for dynamic smartcard synchronization and personalization
US7080037B2 (en) Portable electronic authorization system and method
DE60037783T2 (en) Procedure to change the data stored on a universal card
US20120271771A1 (en) Methods and apparatus for conducting electronic transactions
US20050050367A1 (en) Portable electronic authorization system and method
US7204412B2 (en) Family stored value card program
US7213750B1 (en) Spending account systems and methods
US6402028B1 (en) Integrated production of smart cards
US6016484A (en) System, method and article of manufacture for network electronic payment instrument and certification of payment and credit collection utilizing a payment

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DI LUOFFO, VINCENZO VALENTINO;FELLENSTEIN, CRAIG WILLIAM;REEL/FRAME:014111/0812;SIGNING DATES FROM 20030514 TO 20030516

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE