[go: up one dir, main page]

GB2457221A - Smart Card Web Server (SCWS) administration within a plurality of security domains - Google Patents

Smart Card Web Server (SCWS) administration within a plurality of security domains Download PDF

Info

Publication number
GB2457221A
GB2457221A GB0720297A GB0720297A GB2457221A GB 2457221 A GB2457221 A GB 2457221A GB 0720297 A GB0720297 A GB 0720297A GB 0720297 A GB0720297 A GB 0720297A GB 2457221 A GB2457221 A GB 2457221A
Authority
GB
United Kingdom
Prior art keywords
administrative
web server
content
agent
nfc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0720297A
Other versions
GB0720297D0 (en
Inventor
Nicholas Bone
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vodafone Group PLC
Original Assignee
Vodafone Group PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vodafone Group PLC filed Critical Vodafone Group PLC
Priority to GB0720297A priority Critical patent/GB2457221A/en
Publication of GB0720297D0 publication Critical patent/GB0720297D0/en
Publication of GB2457221A publication Critical patent/GB2457221A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/50Service provisioning or reconfiguring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/086Access security using security domains
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/60Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to a method for remotely managing content on a web server, the web server being hosted in a storage device within an architecture consisting of a plurality of security domains and the web server being managed though a plurality of administrative agents, each agent using one or more corresponding administrative protocols, the method including securing the administrative protocol processed by each administrative agent by a cryptographic keyset containing at least one key and preventing any given administrative agent from using the keys of any other agent. The web server may be a Smart Card Web Server (SCWS). The security domains may be implemented in accordance with Global Platform specifications and the administrative protocol may be an OMA (Open Mobile Alliance) Full Administrative Protocol or Lightweight Administrative Protocol. The managed content may include executable applications accessible at one or more URLs, and at least one of the executable applications may be an NFC (Near Field Communications) application.

Description

IntellcctuaI ) Property Office Fc Cr. inoai,on Application No. GB0720297. I RTrvI Datc:15 Fcbruary 2005 The following terms are registered trademarks and should be read as such wherever they occur in this document: Java UK Intellectual Property Office is an operating name of the Patent Office dti A DT 3ERV3CE
WEB SERVER ADMINISTRATION
The present invention relates to method and system for web server administration in relation to smart card web servers.
Over the past years "contactiess", or near field communications (NFC), has quickly gained popularity and many contactiess services are now commercially deployed. Public transport schemes all over the world use contactless systems and contactiess payments look set to follow. Contactless typically uses a smart card in "credit card" form factor. Other smart card formats are available: of particular interest in the mobile telecommunications is the ubiquitous UICC (often referred to as the SIM card).
A much-discussed extension to NFC is to replace the "credit card" form factor card used in existing contactless services by a mobile phone handset containing a Secure Element such as the SIM card (this arrangement is referred to as "mobile NFC").
It is expected that the first mobile NFC services will use existing contactiess infrastructure.
Mobile NFC takes advantage of the fact that users typically already carry a mobile phone handset and consider mobiles as personal and trusted. In one mobile handset, a user could, in principle, replace numerous physical "contactiess" cards.
A cornerstone of the Mobile NFC is that all security and NFC functionality is controlled by the Secure Element. In this regard, it is noted that the SIM is the widest available deployed portable and standardised security element with more than 2 billion users worldwide. It is therefore highly desirable to use the existing SIM platform rather than to introduce a new secure element to the phone. Furthermore, the SIM is removable and users can maintain their applications and data from one NFC enabled mobile device to another.
The flexibility of Mobile NFC gives rise to a need to support multiple applications from different service providers. Service providers should be able to operate their own NFC applications within the SIM independent of the mobile network operator (MNO) and other service providers. Software development toolkits and programmable interfaces enable service providers to develop applications that can access phone handset functionality and trigger and register for NFC events.
Furthermore, the NFC service data on the SIM card needs to be securely managed by an administrator with appropriate access rights. These issues are addressed by implementing "Security Domains" on the SIM card, in accordance with Global Platform specifications -see in particular "Global Platform Card Specification Version 2.2, March 2006". Different Service Providers or other trusted administrators (Trusted Service Managers) can then be given their own Security Domains on the SIM card, with keys and applications that are isolated from the Issuer's (MNO's) own Security Domain, keys and applications.
A distinct advantage of the Mobile NFC solution is that it can provide a user interface (screen, keyboard, speakers etc.) for the NFC applications hosted on the SIM card. When a rich user interface is required, two general options are possible: I) The handset's browser (or other application supporting an HTTP client) interacts with an HTTP Server supported on the SIM card.
2) A mobile Java application (MiDlet) on the handset interacts with the SIM card using JSR 177.
In this regard, a further advantage of the HTTP option compared to the JSR 177 option is that no special application needs to be installed onto the handset. Thus the NFC applications can be made more easily portable, just by transferring the SIM card from one handset to another. It is therefore desirable that any solution to the above issues is compatible with the HTTP option for the user interface.
The Smart Card Web Server (SCWS) is a technology standardized by OMA (the Open Mobile Alliance) to allow smart cards used in mobile telecommunications (i.e. subscriber identity module (SIM) cards) to support an HTTP (and HT1'PS) web server.
Details of the technology may be found in "OMA Smartcard-Web-Server", OMA-TS-Smartcard_Web_Server-V1_0-20070209-C, Candidate Version 1.0 -09 Feb 2007, published on the OMA website.
The OMA standard specifies an administration protocol to allow a remote party (typically the mobile network operator) to configure and update the SCWS. For example, the administrator can load and delete content (either applications or static files) to a particular URL, create user "login" accounts for the SCWS, restrict users to particular URL ranges/patterns and so on.
Application of the SCWS to the provision of SIM-based mobile NFC brings advantages for NFC service providers as well as the user. The user-visible aspects of Mobile NFC applications and services (welcome pages, logos, PIN entry screens etc.) can be remotely managed and provisioned. There is a richer user experience because mobile NFC services can use the mobile's display and keypad. There is also cost saving potential, for example through replacing physical cards with virtual ones.
In the SCWS standard, the MNO provides the network over which a Service Provider will serve content, and the MNO may also be a service provider. Where the SCWS needs to serve content for several different service providers, it is to be expected that many of the service providers will not want their content to be seen and uploaded by either the MNO and/or the other service providers. As a result, it is contemplated that service providers will not necessarily trust user management and security management to the MNO.
Conventional implementations of the SCWS provide no mechanism for allowing multiple administrating parties to update content in the SCWS. Each service provider would need to trust a single common party to administer all their content.
It is therefore an object of the invention to obviate or at least mitigate the aforementioned problems.
In accordance with one aspect of the present invention, there is provided a method for remotely managing content on a web server, the web server being hosted in a storage device with an architecture consisting of a plurality of security domains and the web server being managed through a plurality of administrative agents, each agent using one or more corresponding administrative protocols, the method including: securing the administrative protocol processed by each administrative agent by a cryptographic keyset containing at least one key; and preventing any given administrative agent from using the keys of any other administrative agents.
In one implementation, the invention provides a means for managing NFC content on a SIM card via an HTTP server, while advantageously preserving the security features (multiple independent administrators, isolation etc.) that are defined in the Global Platform model.
The method combines any or all of the following co-operating features: 1. The SCWS is allowed to have multiple administrators. Each administrator has a separate key to encrypt and manage content onto the card, while the card architecture (e.g. Global Platform security domains) prevents administrators using each other's keys.
2. There is an ownership hierarchy for URL patterns. Only the administrator who owns a pattern can modify content within the URL tree defined by that pattern. The content concerned may be static (fixed pages, images, menus etc.) or dynamic (applications on the card that are activated when connecting to a particular URL, for example NFC applications).
3. Access control rights concerning web server resources (pages, NFC applications etc.) are partitioned by ownership of patterns. Each administrator defines its own community of users and access rules, and can only apply these rules to a URL tree that it owns.
4. Content uploaded by each administrator is linked to a memory quota for the corresponding security domain.
Using the SCWS on SIM cards allows the cards to be used by more than one service provider, while addressing security concerns and avoiding excessive administration work for the mobile network operator.
The features of the invention thus co-operate to permit each administrating party (Service Provider as well as MNO) to update their respective content in the SCWS without compromising the security of the other administrating parties. In particular: 1. The SCWS is allowed to have multiple administrators, one for each Security Domain (see Global Platform specifications) whose owner needs to update SCWS content. There is a tight link between the administrator and the owner of the Security Domain keys; the Global Platform architecture thereby prevents administrators using each other's keys.
2. There is an ownership hierarchy for URL patterns. For instance, the MNO might own the pattern /vodafone/, a bank SD might own the pattern /barclays/ etc. Only the administrator who owns a pattern can modify content within the URL tree defined by that pattern e.g. only the bank SD can create a page at Ibarclays/welcome.html. Further, to reduce the amount of work the MNO has to do, ownership is assigned dynamically e.g. an administrator establishes ownership of an unused top level pattern just by loading some content under it.
3. Security and access control rules, as defined in the OMA SCWS specification ("protection sets"), are partitioned by ownership of patterns. Each administrator defines its own community of users and access rules (https only etc.), and can only apply these rules (protection sets) to a URL tree that it owns.
4. Content uploaded by an administrator is linked to a memory quota for the corresponding security domain. Thus for instance, if an administrator wants to load a 10KByte JPEG file to a welcome page, it will be charged 10K against its memory quota on the card.
For a better understanding of the present invention, reference will now be made, by way of example only, to the accompanying drawings in which:-Figure 1 illustrates a typical mobile NFC arrangement; and Figure 2 shows diagrammatically how NFC service data in a mobile NFC arrangement is remotely managed using a SCWS.
Figure 1 shows the required elements of a typical mobile NFC arrangement -including a terminal (e.g. a mobile handset, PDA, eBook etc.) and a smart card (e.. SIM card/UICC etc.).
In using a mobile NFC service, the user ideally places his mobile handset (or "terminal") close to an NFC contactiess point of service (typically at a distance of less than 20cm from the point of service) and the NFC transaction automatically occurs.
This will be the case for reader mode and for card emulation mode when using NFC infrastructure.
Although ideally all the relevant NFC applications should be automatically launched when the user places his NFC handset against an external contactiess reader or card, there will be situations where the user will need to select a "default" NFC service for activation. Users can over-ride or change this default service via a contactless management application that is hosted in the SIM and available via the mobile's menu.
It is desirable that the end-to-end transaction for a mobile NFC transaction in card emulation mode shall be as quick as in existing contactless infrastructure.
There are services where users will need to be able to make an NFC transaction when the battery is low or zero. In these cases, it is not expected that the user will be able to use the mobile's display as well.
To protect privacy, users may want to be able to activate and deactivate the generic NFC functionality using a physical button or soft key. An indication of whether NFC is on or off should also be provided, such as an icon.
Preferably, the mobile terminal manages all NFC/contactless and mobile events and never loses any event in case of conflict (events triggered at the same time). For instance, if an SMS is received in the middle of a NFC transaction, the SMS must not be lost and should be displayed to the user as usual.
Mobile NFC places certain requirements when accessing NFC service data.
Service providers can update their NFC applications and service data via OTA mechanisms using the same process as for the initial installation of the service. There is also a requirement for service providers to be able to suspend NFC services, and then re-instate them at a later time.
Service providers may also allow their users to access applications and update service data outside a contactiess transaction.
Likewise when removing an NFC service, both service providers and users are able to initiate the termination of a service. There are two options to consider here. The service provider can initiate the deletion of the NFC application and service data (complete removal) or alternatively the NFC application is upgraded whilst the service data is kept and migrated.
The key NFC services have been identified as public transport ticketing, payment, loyalty and event ticketing.
For public transport, tickets or tokens are stored in the NFC application and users can request access to the transportation system by swiping their mobile. The use of contactless cards for public transport is an established service and a mobile NFC solution would have to function with a similar behaviour and improved user experience.
Another challenge is that the NFC transaction should be fast and also function when the phone's handset's battery is low or zero.
A mobile NFC payment transaction is achieved by swiping the mobile over an NFC reader at a point of sale. The payment application on the SIM should behave similar to an existing credit/debit card. Mobile phone handset features and connectivity may be included to enhance user experience and security levels.
The increasing number of loyalty cards in wallets, discourages users from using them and from subscribing to additional cards. These loyalty cards can be stored in the SIM and accessed by the brand distributors through the NFC contactless interface. The terminal handset display can optionally provide a branded interface to those cards. NFC Contactless loyalty cards when linked with mobile advertising could increase the potential value to service providers.
NFC applications contain the application logic and data for a NFC service. In order to guarantee a high and consistent level of security the SIM should be the only execution environment hosting the security functionality and sensitive data for NFC applications.
Conveniently, the card applications will conform to a non-proprietary technology that works across SIM platforms: for example JavaCard technology. New JavaCards APIs have been defined to support the introduction of NFC functionality.
As the expected size of NFC applications will be relatively small, the standard ISO interface on the SIM can still be used for application download. Alternatively the recently agreed "Hi-Speed" IJSB SIM interface may be used.
One component of the terminal in Figure 1 is the contactless front end (CLF).
The CLF handles contactiess RF functionality.
The CLF is a new element in the handset that provides NFC contactiess radio functionality and handles most of the ISO/IEC 14443 parts. The CLF and SIM exchange application level messages (e.g. APDUs) as defined in ETSI HCI specification. This split in functionality provides a separation of concern and optimizes response times over the NFC contactless radio interface. The SWP defines the lower layers (physical and link layers) between the CLF and SIM. Further study is needed into the support of legacy contactiess RF technologies as these may requires different approaches because of their stringent timing constraints.
In card emulation mode the CLF may power the SIM card in order to support a low or zero battery.
The architecture shall support NFC applications in reader and card emulation mode.
ISO/IEC 14443 type A and B shall be supported.
* Standard contactiess applications are compliant to ISO/IEC 14443 parts 2, 3 and 4.
* Non-standard contactiess applications may have a proprietary extensions of ISO/IEC 14443 part(s) 3 and / or 4.
In order to support legacy readers, MIFARE and Calypso shall be supported in card emulation mode by the handset and depending on local market conditions by the SIM card. In order to support legacy readers, the following non-standard NFC applications shall be supported in card emulation mode MIFARE and Calypso.
Figure 1 also shows certain components of the smartcard including the SCWS.
NFC applications require access to the terminal handset in order to interact with the end user through e.g. keypad and screen. In addition the NFC application may want to trigger terminal handset or connectivity functions.
The command set of CAT and USAT is appropriate for the interaction with network elements (sending SMS, setting up a call, BIP etc.), for managing the mobile execution environment (provide local information, timers, events etc.) or for providing user interaction (menus, display text, request user input through the keyboard etc.).
However the CAT and USAT command sets are somewhat restrictive in terms of user interface.
When rich user interfaces are required two options are supported: 1) The handset's browser (or other application supporting an HTTP client) that interacts with the SCWS Serviets combined with static WML/HTML pages will be used. The JavaCard Webserver API is preferably supported on the SIM.
2) A MiDlet that interacts with the S1M using JSR 177 [see Mobile NFC technical guidelines; vl.O; April 2007, GSM Association http://www.gsmworld.com/documents/gsma_nfc_tech_guide_vsl.pdf I The administration mechanisms of SCWS (as defined in OMA SCWS specification) manage static content, mapping of card Applets to HTFP URLs and administration of access control policy (ACP).
Whether data constitutes static content or dynamic content, similar conditions apply to the administration of data stored on the SCWS.
An administrative agent is only able to download static content (or map and unmap a JavaCard Applet) to a URL that hangs from a URL already owned by the agent. The only exception to this rule occurs when the requested URL does not hang from any URL already owned by any agent. In this case, the first level of the requested URL becomes owned by the administrative agent that received the command. The owning agent is the only one which can add or delete static content (or map or unmap JavaCard Applets) in the tree defined by this first level URL Furthermore, an administrative agent is only allowed to map/unmap JavaCards Applets that are associated either to the agent's security domain (SD) or to a service to provider security domain (SPSD) that is associated to the agent's SD. The only exception to this rule is the agent associated to the ISD that shall only be allowed to map/unmap applications associated directly to the ISD.
An owned first level URL will be freed when all the content hanging from that URL is either deleted (static content) or unmapped (dynamic content). Any other administrative agent can use the mechanisms described above to own the URL afterwards.
The SCWS contains at least two configuration resources: * /config/admin_settings, the default configuration resource; and * /configlimei_change that contains data used by the SCWS to contact the MNO when the UICC is moved into a new handset.
The update of the access control protocol (ACP) is enforced when the UICC is moved into a new handset. This ensures that ACP can be modified before the SCWS outputs any content to the new handset.
Implementing user interaction on the SIM only (i.e. via the SCWS and SIM servlets) has several advantages over an approach that splits the application between the SIM and the terminal: * portability of applications and data (i.e. when the SIM is put in another terminal) * simplified (remote) application lifecycle management * challenges that are caused by differences in rendering across handsets will be minimized when the NFC applications are not distributed SIM Serviets shall be able to request the terminal to instantly start a proactive session using the I-IC! connectivity event.
Conveniently, Mobile Network Operators (MNOs) operate secure remote SIM management systems and processes that can be leveraged to manage the whole life cycle of NFC services.
In addition to more traditional MNO and Service Provider roles, Mobile NFC requires a Trusted Service Manager (TSM) role to facilitate the business relationships between MNOs and NFC service providers. This is needed to encourage existing and new service providers to adopt Mobile NFC. There is a consequent need to support multiple TSMs in the market.
The TSM role allows Service Providers to delegate application lifecycle management and personalisation to the TSM, thus avoiding the need to establish trusted relationships with every MNO.
A typical TSM will have responsibilities including: * Remote management (installation, update, activation and removal) of NFC applications.
* Securely provisioning application data to installed NFC applications.
* Testing, verification and certification of NFC applications prior to their installation.
Depending on local market needs the TSM can be managed by one MNO, a consortium of MNOs or by independent trusted third parties. There will be a need to support multiple TSMs in one market.
As a result of a user request, service providers will be able to initiate, via the TSM, the secure OTA download of an NFC application directly to a user's S1M. Users will be informed of the download, and can be prompted for acceptance. The choice of message displayed to the user will be at the service provider's discretion (i.e. customisable system messages).
Service data may be delivered together with the application or separately using OTA mechanisms.
It is worth emphasising that SIM security is based on global, well-established standards (ETSI, GlobalPiatform and 3GPP) covering application execution and storage, "over the air" (OTA) management and the entire life cycle management. It is not considered within the scope of the present discussion to explain these mechanisms in further detail.
The security framework of the SIM ensures the privacy and integrity of a service provider's NFC applications & services. No other functionality can access application data or invoke functions of installed NFC applications. Memory quotas per TSM and per service provider application are enforced during the card's operation in order to ensure the overall integrity of the SIM.
As a matter of practical importance, users should also be able to swap between NFC-enabled mobiles, NFC SIMs and across MNOs and still receive the same NFC services (assuming, of course that the service is supported by the MNO).
Figure 2 illustrates the basic method for implementing remote administration of the SCWS.
Both SMS and GPRS via BIP shall be used as OTA channels for remote management over the standard ISO interface. The SIM shall support both TCP and CAT_TP via BIP.
Security domains as defined by GlobalPlatform shall be used to support multiple businesses sharing the same SIM resources.
The MNO owns the keys for the card's Issuer Security Domain (ISD), which is where the MNO's applications, e.g. (U)SIM, are stored. The MNO can also act as a TSM.
Every TSM owns the keys for its respective security domain (TSD). The MNO grants the TSM the facility to remotely manage card applications using either authorised or delegated management as defined in GlobalPiatform v2.2.
A service provider that requires strict confidentiality for managing its applications and/or data (so that not even a TSM sees the data) shall be assigned its own security domain (SPSD). A service provider's security domain shall be associated with one TSM security domain, or the Issuer security domain. Using confidential card content management, a service provider can install and personalize applications using the MNO's or TSM's OTA infrastructure.
For security reasons all security domains are pre-loaded during card production and may be activated over the air. The keys provisioned in the TSM or service provider security domains are never accessible to the MNO but kept securely by the card manufacturer and distributed directly to the TSM and/or service provider upon MNO request. OTA installation of security domains is left as a future extension.
Memory quotas, limiting the amount of memory that is available to each defined TSM, prevent one TSM using more SIM space than has been allocated by the MNO, both in the TSM's own security domain (TSD) and in any associated service provider's security domains (SPSDs). The MNO can also completely erase all content that has been loaded into a TSD and all associated SPSDs simply by reducing the TSM's quota down to zero.
In an embodiment of the invention, remote administration is permitted from >1 administrators/service providers.
The SCWS and the standard administrative agent are associated to the ISD. The UICC shall support additional administrative agents associated to TSDs. It shall be possible for the ISD to create these new agents using over the air mechanisms, but not the keys that the agents use.
The following aspects are supported by each administrative agent: * Download of static content: the memory consumed by static content downloaded through one agent shall be charged against the quota of its associated SD.
* POST requests with the special administration commands to map/unmap a JavaCard Applet.
* POST requests with the special administration commands for the management of protection sets and users. Each administrative agent shall have its own collection of protection sets and users. These shall be independent of those of other administrative agents. Each administrative agent shall only be able to apply a protection set to content that hangs from a first level URL it owns.
* The Lightweight and the Full Administration Protocol, as defined in the
OMA SCWS specification
The following administration actions are reserved for the standard administrative agent associated to ISD: * PUT request for updating the ACP information * POST request with the special administration commands for http/s on/off * Updating of the content under /config The invention improves service providers' ability to offer portability of NFC services when a mobile user switches to a new mobile terminal. Application data and logic are available when the SIM is inserted into a new handset terminal. For solutions that use a MIDlet for user interaction, the MIDlet also needs to be reinstalled on the new handset.
The CLF and SIM may need to be reconfigured in order to accommodate the new setup. Different mechanisms are supported in order to detect that the SIM has been moved to a new handset: * Generic CAT: A card Applet may verify the handset's IMEI at start-up.
* NFC specific: SyncID in SWP and Session Identity in HCI Card application management and selection There shall be a central management application on the SIM that facilitates the life-cycle management of contactiess applications.
* The management application is responsible for configuring the CLF during the life-cycle of NFC applications (e.g. provisioning the proper RF settings).
* Remote activation of contactiess applications from the service provider shall be possible through the management application.
* In situations where automatic triggering of one NFC application is not possible the management application may request the user to manually select the desired behaviour.
* In addition the handset shall provide a button or a menu option that allows the user to switch on or off NFC functionality globally.
Acronyms APDU Application Protocol Data Unit API Application Programming Interface BIP Bearer Independent Protocol CLF Contactiess Front CLT Contactiess Tunnel CAT Card Application Toolkit HCI Host Controller Interface ISD Issuer Security Domain IMEI International Mobile Equipment Identity MNO Mobile Network Operator
NFC Near Field Communication
OTA Over The Air SCWS Smart Card Web Server SIM Subscriber Identity Module SWP Single Wire Protocol TSM Trusted Service Manager USAT USIM Application Toolkit UICC Universal Integrated Circuit Card

Claims (10)

  1. CLAIMS: 1. A method for remotely managing content on a web server, the web server being hosted in a storage device with an architecture consisting of a plurality of security domains and the web server being managed through a plurality of administrative agents, each agent using one or more corresponding administrative protocols, the method including: securing the administrative protocol processed by each administrative agent by a cryptographic keyset containing at least one key; and preventing any given administrative agent from using the keys of any other administrative agents.
  2. 2. The method of claim 1, wherein the cryptographic keyset used by each administrative agent is implemented in a corresponding one of said security domains, thereby ensuring there is a unique mapping from administrative agent to security domain.
  3. 3. The method of claim 2, wherein said corresponding security domain has an owner outside the storage device, the owner managing content on the webserver using the administrative protocol and the cryptographic keyset.
  4. 4. The method of any one of the preceding claims, wherein the security domains are implemented in accordance with Global Platform specifications.
  5. 5. The method of any one of the preceding claims wherein the web server is a Smart Card Web Server.
  6. 6. The method of any of claims I to 5, wherein the administrative protocol is an OMA Full Administration Protocol.
  7. 7. The method of any of claims I to 5, wherein the administrative protocol is an OMA Lightweight Administration Protocol.
  8. 8. The method of any one of the preceding claims, wherein the managed content includes static content accessible at one or more URLs
  9. 9. The method of any one of the preceding claims, wherein the managed content includes executable applications accessible at one or more URLs.
  10. 10. The method of claim 9 wherein at least one of the executable applications is a contactiess application. I011. The method of claim 9 wherein at least one of the executable applications is an NFC application.12. The method of any one of claims 8 to 11, further including enforcing a hierarchical ownership pattern of URLs, in which only the administrative agent which owns a URL pattern is permitted to manage content within the URL tree defined by the pattern.13. The method of claim 12, further including granting ownership of an unused URL pattern to an administrative agent when the agent is the first administrative agent to load content to a URL under that pattern.14. The method of claim 12 or claim 13, further including deleting all content under a previously used URL pattern, thereby rendering said pattern unused.15. The method of any of claims 8 to 14, further including partitioning access control rights concerning web server content by ownership of URL patterns, only the administrative agent that owns a URL pattern being pennitted to apply access control niles to URLs under that pattern.16. The method of claim 15, wherein said access control rules consist of OMA SCWS protection sets.17. The method of claim 15 wherein said access control rules consist of extended versions of OMA SWCS protection sets.18. The method of any one of the preceding claims, further including subjecting the content managed by at least one of the administrative agents to a memory quota.19. The method of claim 22 wherein the quota is managed by an overall administrator of the storage device.20. The method of claim 23, wherein the overall administrator is a Mobile Network Operator.21. The method of any of claims 22 to 24, further including reducing the quota to zero in order to erase all content managed by said at least one administrative agent.22. A system for remotely managing content on a web server, the system including a storage device with an architecture consisting of a plurality of security domains, the storage device hosting the web server, wherein the web server, in operation, executes the method claimed in any one of claims 1 to 21.23. The system of claim 22 wherein the web server is implemented within a component of a mobile terminal.24. The system of claim 23 wherein the component is removable.25. The system of claim 23 or claim 24, wherein the component is a storage device.26. The system of any one of claims 22 to 25, wherein the storage device is a smart card.
GB0720297A 2007-10-17 2007-10-17 Smart Card Web Server (SCWS) administration within a plurality of security domains Withdrawn GB2457221A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0720297A GB2457221A (en) 2007-10-17 2007-10-17 Smart Card Web Server (SCWS) administration within a plurality of security domains

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0720297A GB2457221A (en) 2007-10-17 2007-10-17 Smart Card Web Server (SCWS) administration within a plurality of security domains

Publications (2)

Publication Number Publication Date
GB0720297D0 GB0720297D0 (en) 2007-11-28
GB2457221A true GB2457221A (en) 2009-08-12

Family

ID=38813975

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0720297A Withdrawn GB2457221A (en) 2007-10-17 2007-10-17 Smart Card Web Server (SCWS) administration within a plurality of security domains

Country Status (1)

Country Link
GB (1) GB2457221A (en)

Cited By (154)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2967514A1 (en) * 2010-11-17 2012-05-18 Inside Contactless Method for conducting transaction between e.g. mobile telephone and ticket issuing machine in area, involves establishing communication channel between portable and transaction devices, transferring program, and receiving application data
FR2967513A1 (en) * 2010-11-17 2012-05-18 Inside Contactless Near-field communication transaction performing method for use in e.g. supermarket, involves utilizing application program to conduct transaction with transaction device, and utilizing media as relay contact to close transaction terminal
EP2455923A1 (en) * 2010-11-17 2012-05-23 Inside Secure NFC transaction server
US8196131B1 (en) 2010-12-17 2012-06-05 Google Inc. Payment application lifecycle management in a contactless smart card
WO2012083221A1 (en) * 2010-12-17 2012-06-21 Google Inc. Local trusted services manager for a contactless smart card
US8255687B1 (en) 2011-09-15 2012-08-28 Google Inc. Enabling users to select between secure service providers using a key escrow service
US8297520B1 (en) 2011-09-16 2012-10-30 Google Inc. Secure application directory
US8335921B2 (en) 2010-12-17 2012-12-18 Google, Inc. Writing application data to a secure element
US8379863B1 (en) 2011-09-15 2013-02-19 Google Inc. Enabling users to select between secure service providers using a central trusted service manager
US8385553B1 (en) 2012-02-28 2013-02-26 Google Inc. Portable secure element
US8429409B1 (en) 2012-04-06 2013-04-23 Google Inc. Secure reset of personal and service provider information on mobile devices
EP2482235A4 (en) * 2009-09-22 2013-08-28 Sk Planet Co Ltd NAVIGATION SYSTEM BASED ON INTELLIGENT CARDS AND METHOD THEREFOR, AND SYSTEM-APPLIED CHIP CARD
WO2013138867A1 (en) * 2012-03-22 2013-09-26 Secure Nfc Pty. Ltd. Secure nfc apparatus and method
AU2013222020B2 (en) * 2010-12-17 2013-10-31 Google Llc Local trusted services manager for a contactless smart card
EP2477165A4 (en) * 2009-09-11 2014-05-21 China Unionpay Co Ltd MULTI-APPLICATION CHIP CARD AND SYSTEM AND METHOD FOR MANAGING MULTIPLE CHIP CARD APPLICATIONS
EP2657877A3 (en) * 2012-04-24 2014-06-11 Daon Holdings Limited Methods and systems for conducting smart card transactions
US8793651B2 (en) 2012-05-24 2014-07-29 International Business Machines Corporation Remote card content management using synchronous server-side scripting
EP2827274A1 (en) * 2013-07-17 2015-01-21 PT Oberthur Technologies Indonesia LTD. Method of enforcing control of access by a device to a secure element, and corresponding secure element
US20150134958A1 (en) * 2010-12-06 2015-05-14 Gemalto Sa Uiccs embedded in terminals or removable therefrom
US9408066B2 (en) 2010-12-06 2016-08-02 Gemalto Inc. Method for transferring securely the subscription information and user data from a first terminal to a second terminal
US10425129B1 (en) 2019-02-27 2019-09-24 Capital One Services, Llc Techniques to reduce power consumption in near field communication systems
US10438437B1 (en) 2019-03-20 2019-10-08 Capital One Services, Llc Tap to copy data to clipboard via NFC
US10467622B1 (en) 2019-02-01 2019-11-05 Capital One Services, Llc Using on-demand applications to generate virtual numbers for a contactless card to securely autofill forms
US10467445B1 (en) 2019-03-28 2019-11-05 Capital One Services, Llc Devices and methods for contactless card alignment with a foldable mobile device
US10489781B1 (en) 2018-10-02 2019-11-26 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10498401B1 (en) 2019-07-15 2019-12-03 Capital One Services, Llc System and method for guiding card positioning using phone sensors
US10505738B1 (en) 2018-10-02 2019-12-10 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10506426B1 (en) 2019-07-19 2019-12-10 Capital One Services, Llc Techniques for call authentication
US10510074B1 (en) 2019-02-01 2019-12-17 Capital One Services, Llc One-tap payment using a contactless card
US10511443B1 (en) 2018-10-02 2019-12-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10516447B1 (en) 2019-06-17 2019-12-24 Capital One Services, Llc Dynamic power levels in NFC card communications
US10523708B1 (en) 2019-03-18 2019-12-31 Capital One Services, Llc System and method for second factor authentication of customer support calls
US10535062B1 (en) 2019-03-20 2020-01-14 Capital One Services, Llc Using a contactless card to securely share personal data stored in a blockchain
US10541995B1 (en) 2019-07-23 2020-01-21 Capital One Services, Llc First factor contactless card authentication system and method
US10542036B1 (en) 2018-10-02 2020-01-21 Capital One Services, Llc Systems and methods for signaling an attack on contactless cards
US10546444B2 (en) 2018-06-21 2020-01-28 Capital One Services, Llc Systems and methods for secure read-only authentication
US10554411B1 (en) 2018-10-02 2020-02-04 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10565587B1 (en) 2018-10-02 2020-02-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10581611B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10582386B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10579998B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10592710B1 (en) 2018-10-02 2020-03-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10607216B1 (en) 2018-10-02 2020-03-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10607214B1 (en) 2018-10-02 2020-03-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10615981B1 (en) 2018-10-02 2020-04-07 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10623393B1 (en) 2018-10-02 2020-04-14 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10630653B1 (en) 2018-10-02 2020-04-21 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10643420B1 (en) 2019-03-20 2020-05-05 Capital One Services, Llc Contextual tapping engine
US10657754B1 (en) 2019-12-23 2020-05-19 Capital One Services, Llc Contactless card and personal identification system
US10664941B1 (en) 2019-12-24 2020-05-26 Capital One Services, Llc Steganographic image encoding of biometric template information on a card
US10680824B2 (en) 2018-10-02 2020-06-09 Capital One Services, Llc Systems and methods for inventory management using cryptographic authentication of contactless cards
US10685350B2 (en) 2018-10-02 2020-06-16 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10686603B2 (en) 2018-10-02 2020-06-16 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10701560B1 (en) 2019-10-02 2020-06-30 Capital One Services, Llc Client device authentication using contactless legacy magnetic stripe data
US10713649B1 (en) 2019-07-09 2020-07-14 Capital One Services, Llc System and method enabling mobile near-field communication to update display on a payment card
US10733645B2 (en) 2018-10-02 2020-08-04 Capital One Services, Llc Systems and methods for establishing identity for order pick up
US10733283B1 (en) 2019-12-23 2020-08-04 Capital One Services, Llc Secure password generation and management using NFC and contactless smart cards
US10733601B1 (en) 2019-07-17 2020-08-04 Capital One Services, Llc Body area network facilitated authentication or payment authorization
US10748138B2 (en) 2018-10-02 2020-08-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10757574B1 (en) 2019-12-26 2020-08-25 Capital One Services, Llc Multi-factor authentication providing a credential via a contactless card for secure messaging
US10769299B2 (en) 2018-07-12 2020-09-08 Capital One Services, Llc System and method for dynamic generation of URL by smart card
US10771254B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for email-based card activation
US10771253B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10783519B2 (en) 2018-10-02 2020-09-22 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10797882B2 (en) 2018-10-02 2020-10-06 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10832271B1 (en) 2019-07-17 2020-11-10 Capital One Services, Llc Verified reviews using a contactless card
US10841091B2 (en) 2018-10-02 2020-11-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10853795B1 (en) 2019-12-24 2020-12-01 Capital One Services, Llc Secure authentication based on identity data stored in a contactless card
US10861006B1 (en) 2020-04-30 2020-12-08 Capital One Services, Llc Systems and methods for data access control using a short-range transceiver
US10860814B2 (en) 2018-10-02 2020-12-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10860914B1 (en) 2019-12-31 2020-12-08 Capital One Services, Llc Contactless card and method of assembly
US10862540B1 (en) 2019-12-23 2020-12-08 Capital One Services, Llc Method for mapping NFC field strength and location on mobile devices
US10871958B1 (en) 2019-07-03 2020-12-22 Capital One Services, Llc Techniques to perform applet programming
US10885410B1 (en) 2019-12-23 2021-01-05 Capital One Services, Llc Generating barcodes utilizing cryptographic techniques
US10885514B1 (en) 2019-07-15 2021-01-05 Capital One Services, Llc System and method for using image data to trigger contactless card transactions
US10909527B2 (en) 2018-10-02 2021-02-02 Capital One Services, Llc Systems and methods for performing a reissue of a contactless card
US10909544B1 (en) 2019-12-26 2021-02-02 Capital One Services, Llc Accessing and utilizing multiple loyalty point accounts
US10915888B1 (en) 2020-04-30 2021-02-09 Capital One Services, Llc Contactless card with multiple rotating security keys
US10949520B2 (en) 2018-10-02 2021-03-16 Capital One Services, Llc Systems and methods for cross coupling risk analytics and one-time-passcodes
US10963865B1 (en) 2020-05-12 2021-03-30 Capital One Services, Llc Augmented reality card activation experience
US10970712B2 (en) 2019-03-21 2021-04-06 Capital One Services, Llc Delegated administration of permissions using a contactless card
US10984416B2 (en) 2019-03-20 2021-04-20 Capital One Services, Llc NFC mobile currency transfer
US10992477B2 (en) 2018-10-02 2021-04-27 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11030339B1 (en) 2020-04-30 2021-06-08 Capital One Services, Llc Systems and methods for data access control of personal user data using a short-range transceiver
US11037136B2 (en) 2019-01-24 2021-06-15 Capital One Services, Llc Tap to autofill card data
US11038688B1 (en) 2019-12-30 2021-06-15 Capital One Services, Llc Techniques to control applets for contactless cards
US11063979B1 (en) 2020-05-18 2021-07-13 Capital One Services, Llc Enabling communications between applications in a mobile operating system
US11062098B1 (en) 2020-08-11 2021-07-13 Capital One Services, Llc Augmented reality information display and interaction via NFC based authentication
US11100511B1 (en) 2020-05-18 2021-08-24 Capital One Services, Llc Application-based point of sale system in mobile operating systems
US11113685B2 (en) 2019-12-23 2021-09-07 Capital One Services, Llc Card issuing with restricted virtual numbers
US11120453B2 (en) 2019-02-01 2021-09-14 Capital One Services, Llc Tap card to securely generate card data to copy to clipboard
US11165586B1 (en) 2020-10-30 2021-11-02 Capital One Services, Llc Call center web-based authentication using a contactless card
US11182771B2 (en) 2019-07-17 2021-11-23 Capital One Services, Llc System for value loading onto in-vehicle device
US11200563B2 (en) 2019-12-24 2021-12-14 Capital One Services, Llc Account registration using a contactless card
US11210656B2 (en) 2020-04-13 2021-12-28 Capital One Services, Llc Determining specific terms for contactless card activation
US11210664B2 (en) 2018-10-02 2021-12-28 Capital One Services, Llc Systems and methods for amplifying the strength of cryptographic algorithms
US11216799B1 (en) 2021-01-04 2022-01-04 Capital One Services, Llc Secure generation of one-time passcodes using a contactless card
US11216623B1 (en) 2020-08-05 2022-01-04 Capital One Services, Llc Systems and methods for controlling secured data transfer via URLs
US11222342B2 (en) 2020-04-30 2022-01-11 Capital One Services, Llc Accurate images in graphical user interfaces to enable data transfer
US11245438B1 (en) 2021-03-26 2022-02-08 Capital One Services, Llc Network-enabled smart apparatus and systems and methods for activating and provisioning same
US11354555B1 (en) 2021-05-04 2022-06-07 Capital One Services, Llc Methods, mediums, and systems for applying a display to a transaction card
US11361302B2 (en) 2019-01-11 2022-06-14 Capital One Services, Llc Systems and methods for touch screen interface interaction using a card overlay
US11373169B2 (en) 2020-11-03 2022-06-28 Capital One Services, Llc Web-based activation of contactless cards
US11392933B2 (en) 2019-07-03 2022-07-19 Capital One Services, Llc Systems and methods for providing online and hybridcard interactions
US11438329B2 (en) 2021-01-29 2022-09-06 Capital One Services, Llc Systems and methods for authenticated peer-to-peer data transfer using resource locators
US11455620B2 (en) 2019-12-31 2022-09-27 Capital One Services, Llc Tapping a contactless card to a computing device to provision a virtual number
US11482312B2 (en) 2020-10-30 2022-10-25 Capital One Services, Llc Secure verification of medical status using a contactless card
US11521262B2 (en) 2019-05-28 2022-12-06 Capital One Services, Llc NFC enhanced augmented reality information overlays
US11521213B2 (en) 2019-07-18 2022-12-06 Capital One Services, Llc Continuous authentication for digital services based on contactless card positioning
US11562358B2 (en) 2021-01-28 2023-01-24 Capital One Services, Llc Systems and methods for near field contactless card communication and cryptographic authentication
US11615395B2 (en) 2019-12-23 2023-03-28 Capital One Services, Llc Authentication for third party digital wallet provisioning
US11637826B2 (en) 2021-02-24 2023-04-25 Capital One Services, Llc Establishing authentication persistence
US11651361B2 (en) 2019-12-23 2023-05-16 Capital One Services, Llc Secure authentication based on passport data stored in a contactless card
US11683325B2 (en) 2020-08-11 2023-06-20 Capital One Services, Llc Systems and methods for verified messaging via short-range transceiver
US11682012B2 (en) 2021-01-27 2023-06-20 Capital One Services, Llc Contactless delivery systems and methods
US11694187B2 (en) 2019-07-03 2023-07-04 Capital One Services, Llc Constraining transactional capabilities for contactless cards
US11777933B2 (en) 2021-02-03 2023-10-03 Capital One Services, Llc URL-based authentication for payment cards
US11792001B2 (en) 2021-01-28 2023-10-17 Capital One Services, Llc Systems and methods for secure reprovisioning
US11823175B2 (en) 2020-04-30 2023-11-21 Capital One Services, Llc Intelligent card unlock
US11902442B2 (en) 2021-04-22 2024-02-13 Capital One Services, Llc Secure management of accounts on display devices using a contactless card
US11935035B2 (en) 2021-04-20 2024-03-19 Capital One Services, Llc Techniques to utilize resource locators by a contactless card to perform a sequence of operations
US11961089B2 (en) 2021-04-20 2024-04-16 Capital One Services, Llc On-demand applications to extend web services
US12041172B2 (en) 2021-06-25 2024-07-16 Capital One Services, Llc Cryptographic authentication to control access to storage devices
US12061682B2 (en) 2021-07-19 2024-08-13 Capital One Services, Llc System and method to perform digital authentication using multiple channels of communication
US12062258B2 (en) 2021-09-16 2024-08-13 Capital One Services, Llc Use of a payment card to unlock a lock
US12069173B2 (en) 2021-12-15 2024-08-20 Capital One Services, Llc Key recovery based on contactless card authentication
US12086852B2 (en) 2019-07-08 2024-09-10 Capital One Services, Llc Authenticating voice transactions with payment card
US12125021B2 (en) 2018-12-18 2024-10-22 Capital One Services, Llc Devices and methods for selective contactless communication
US12124903B2 (en) 2023-03-16 2024-10-22 Capital One Services, Llc Card with a time-sensitive element and systems and methods for implementing the same
US12141795B2 (en) 2018-09-19 2024-11-12 Capital One Services, Llc Systems and methods for providing card interactions
US12143515B2 (en) 2021-03-26 2024-11-12 Capital One Services, Llc Systems and methods for transaction card-based authentication
US12141804B2 (en) 2016-12-28 2024-11-12 Capital One Services, Llc Dynamic transaction card protected by multi- factor authentication
US12147983B2 (en) 2023-01-13 2024-11-19 Capital One Services, Llc Systems and methods for multi-factor authentication using device tracking and identity verification
US12160419B2 (en) 2021-04-15 2024-12-03 Capital One Services, Llc Authenticated messaging session with contactless card authentication
US12166750B2 (en) 2022-02-08 2024-12-10 Capital One Services, Llc Systems and methods for secure access of storage
US12165149B2 (en) 2020-08-12 2024-12-10 Capital One Services, Llc Systems and methods for user verification via short-range transceiver
US12200135B2 (en) 2023-06-13 2025-01-14 Capital One Services, Llc Contactless card-based authentication via web-browser
US12248928B2 (en) 2023-03-13 2025-03-11 Capital One Services, Llc Systems and methods of secure merchant payment over messaging platform using a contactless card
US12248832B2 (en) 2023-03-07 2025-03-11 Capital One Services, Llc Systems and methods for steganographic image encoding and identity verification using same
US12289396B2 (en) 2022-08-18 2025-04-29 Capital One Services, Llc Parallel secret salt generation and authentication for encrypted communication
US12301735B2 (en) 2021-06-18 2025-05-13 Capital One Services, Llc Systems and methods for contactless card communication and multi-device key pair cryptographic authentication
US12299672B2 (en) 2023-03-30 2025-05-13 Capital One Services, Llc System and method for authentication with transaction cards
US12335256B2 (en) 2023-03-08 2025-06-17 Capital One Services, Llc Systems and methods for device binding authentication
US12335412B2 (en) 2021-06-21 2025-06-17 Capital One Services, Llc Systems and methods for scalable cryptographic authentication of contactless cards
US12354104B2 (en) 2022-08-09 2025-07-08 Capital One Services, Llc Methods and arrangements for proof of purchase
US12354077B2 (en) 2022-06-23 2025-07-08 Capital One Services, Llc Mobile web browser authentication and checkout using a contactless card
US12495042B2 (en) 2021-08-16 2025-12-09 Capital One Services, Llc Systems and methods for resetting an authentication counter
US12499432B2 (en) 2023-04-06 2025-12-16 Capital One Services, Llc Techniques to perform operations with a contactless card when in the presence of a trusted device
US12505448B2 (en) 2023-08-09 2025-12-23 Capital One Services, Llc Systems and methods for fraud prevention in mobile application verification device enrollment process
US12505450B2 (en) 2022-08-17 2025-12-23 Capital One Services, Llc Systems and methods for dynamic data generation and cryptographic card authentication
US12511638B2 (en) 2023-09-07 2025-12-30 Capital One Services, Llc Assignment of near-field communications applets
US12511640B2 (en) 2023-03-13 2025-12-30 Capital One Services, Llc Systems and methods of managing password using contactless card
US12511654B2 (en) 2022-08-08 2025-12-30 Capital One Services, Llc Systems and methods for bypassing contactless payment transaction limit
US12519652B2 (en) 2023-02-24 2026-01-06 Capital One Services, Llc System and method for dynamic integration of user-provided data with one-time-password authentication cryptogram

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005076204A1 (en) * 2004-02-09 2005-08-18 Hismartech Co., Ltd. Smart card for containing plural issuer security domain and method for installing plural issuer security domain in a smart card

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005076204A1 (en) * 2004-02-09 2005-08-18 Hismartech Co., Ltd. Smart card for containing plural issuer security domain and method for installing plural issuer security domain in a smart card

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Gemalto, "Mobile Contactless solutions. Releasing the full potential of Near Field Communication (NFC)", dated February 2007, obtained from the Internet at: <www.gemalto.com/brochures/download/mobile_contactless.pdf> Retrieved on 14/2/08. *
GSM Association, "Mobile NFC technical guidelines", Version 1.0, dated April 2007, obtained from the Internet at: <www.gsmworld.com/documents/gsma_nfc_tech_guide_vs1.pdf> Retrieved on 14/2/08. *

Cited By (273)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9009476B2 (en) 2009-09-11 2015-04-14 China Unionpay Co., Ltd. Multi-application smart card, and system and method for multi-application management of smart card
EP2477165A4 (en) * 2009-09-11 2014-05-21 China Unionpay Co Ltd MULTI-APPLICATION CHIP CARD AND SYSTEM AND METHOD FOR MANAGING MULTIPLE CHIP CARD APPLICATIONS
US8579202B2 (en) 2009-09-22 2013-11-12 Sk Planet Co., Ltd. Smart card-based browsing system and smart card-based browsing method and smart card for the same
EP2482235A4 (en) * 2009-09-22 2013-08-28 Sk Planet Co Ltd NAVIGATION SYSTEM BASED ON INTELLIGENT CARDS AND METHOD THEREFOR, AND SYSTEM-APPLIED CHIP CARD
KR102010355B1 (en) * 2010-11-17 2019-08-13 인사이드 씨큐어 Nfc transaction server
US10169754B2 (en) 2010-11-17 2019-01-01 Inside Secure Method and system for NFC transaction
FR2967513A1 (en) * 2010-11-17 2012-05-18 Inside Contactless Near-field communication transaction performing method for use in e.g. supermarket, involves utilizing application program to conduct transaction with transaction device, and utilizing media as relay contact to close transaction terminal
CN102567910A (en) * 2010-11-17 2012-07-11 英赛瑟库尔公司 NFC transaction server
KR20120089786A (en) * 2010-11-17 2012-08-13 인사이드 씨큐어 Nfc transaction server
WO2012066251A1 (en) * 2010-11-17 2012-05-24 Inside Secure Improved method and system for nfc transaction
EP2455923A1 (en) * 2010-11-17 2012-05-23 Inside Secure NFC transaction server
US10185950B2 (en) 2010-11-17 2019-01-22 Inside Secure NFC transaction server
EP2455922A1 (en) * 2010-11-17 2012-05-23 Inside Secure NFC transaction method and system
CN102567910B (en) * 2010-11-17 2017-12-08 英赛瑟库尔公司 NFC transaction server
FR2967514A1 (en) * 2010-11-17 2012-05-18 Inside Contactless Method for conducting transaction between e.g. mobile telephone and ticket issuing machine in area, involves establishing communication channel between portable and transaction devices, transferring program, and receiving application data
US9462475B2 (en) * 2010-12-06 2016-10-04 Gemalto Sa UICCs embedded in terminals or removable therefrom
US9408066B2 (en) 2010-12-06 2016-08-02 Gemalto Inc. Method for transferring securely the subscription information and user data from a first terminal to a second terminal
US20150134958A1 (en) * 2010-12-06 2015-05-14 Gemalto Sa Uiccs embedded in terminals or removable therefrom
US9294919B2 (en) 2010-12-06 2016-03-22 Gemalto Sa Method for exporting on a secure server data comprised on a UICC comprised in a terminal
US9817993B2 (en) 2010-12-06 2017-11-14 Gemalto Sa UICCs embedded in terminals or removable therefrom
US9301145B2 (en) 2010-12-06 2016-03-29 Gemalto Sa UICCs embedded in terminals or removable therefrom
US9760726B2 (en) 2010-12-06 2017-09-12 Gemalto Sa Method for remotely delivering a full subscription profile to a UICC over IP
US9326146B2 (en) 2010-12-06 2016-04-26 Gemalto Inc. Method for downloading a subscription in an UICC embedded in a terminal
US10242210B2 (en) 2010-12-06 2019-03-26 Gemalto Sa Method for managing content on a secure element connected to an equipment
US9946888B2 (en) 2010-12-06 2018-04-17 Gemalto Sa System for managing multiple subscriptions in a UICC
US9690950B2 (en) 2010-12-06 2017-06-27 Gemalto Sa Method for exporting data of a Javacard application stored in a UICC to a host
US9532223B2 (en) 2010-12-06 2016-12-27 Gemalto Sa Method for downloading a subscription from an operator to a UICC embedded in a terminal
WO2012083221A1 (en) * 2010-12-17 2012-06-21 Google Inc. Local trusted services manager for a contactless smart card
US8646059B1 (en) 2010-12-17 2014-02-04 Google Inc. Wallet application for interacting with a secure element application without a trusted server for authentication
US8196131B1 (en) 2010-12-17 2012-06-05 Google Inc. Payment application lifecycle management in a contactless smart card
US8793508B2 (en) 2010-12-17 2014-07-29 Google Inc. Local trusted services manager for a contactless smart card
US8621168B2 (en) 2010-12-17 2013-12-31 Google Inc. Partitioning the namespace of a contactless smart card
US8806199B2 (en) 2010-12-17 2014-08-12 Google Inc. Writing application data to a secure element
AU2013222020B2 (en) * 2010-12-17 2013-10-31 Google Llc Local trusted services manager for a contactless smart card
US8807440B1 (en) 2010-12-17 2014-08-19 Google Inc. Routing secure element payment requests to an alternate application
US8335932B2 (en) 2010-12-17 2012-12-18 Google Inc. Local trusted services manager for a contactless smart card
US8335921B2 (en) 2010-12-17 2012-12-18 Google, Inc. Writing application data to a secure element
US8352749B2 (en) 2010-12-17 2013-01-08 Google Inc. Local trusted services manager for a contactless smart card
US8412933B1 (en) 2011-09-15 2013-04-02 Google Inc. Enabling users to select between secure service providers using a key escrow service
US8379863B1 (en) 2011-09-15 2013-02-19 Google Inc. Enabling users to select between secure service providers using a central trusted service manager
US8255687B1 (en) 2011-09-15 2012-08-28 Google Inc. Enabling users to select between secure service providers using a key escrow service
US8737621B2 (en) 2011-09-15 2014-05-27 Google Inc. Enabling users to select between secure service providers using a central trusted service manager
US9450927B2 (en) 2011-09-15 2016-09-20 Google Inc. Enabling users to select between secure service providers using a key escrow service
US8297520B1 (en) 2011-09-16 2012-10-30 Google Inc. Secure application directory
US8511573B2 (en) 2011-09-16 2013-08-20 Google Inc. Secure application directory
US8313036B1 (en) 2011-09-16 2012-11-20 Google Inc. Secure application directory
US8625800B2 (en) 2012-02-28 2014-01-07 Google Inc. Portable secure element
US8385553B1 (en) 2012-02-28 2013-02-26 Google Inc. Portable secure element
WO2013138867A1 (en) * 2012-03-22 2013-09-26 Secure Nfc Pty. Ltd. Secure nfc apparatus and method
US8971533B2 (en) 2012-04-06 2015-03-03 Google Inc. Secure reset of personal and service provider information on mobile devices
US8429409B1 (en) 2012-04-06 2013-04-23 Google Inc. Secure reset of personal and service provider information on mobile devices
EP2657877A3 (en) * 2012-04-24 2014-06-11 Daon Holdings Limited Methods and systems for conducting smart card transactions
US8990572B2 (en) 2012-04-24 2015-03-24 Daon Holdings Limited Methods and systems for conducting smart card transactions
US8813029B2 (en) 2012-05-24 2014-08-19 International Business Machines Corporation Remote card content management using synchronous server-side scripting
US8793651B2 (en) 2012-05-24 2014-07-29 International Business Machines Corporation Remote card content management using synchronous server-side scripting
US9767275B2 (en) 2013-07-17 2017-09-19 Pt Oberthur Technologies Indonesia Ltd. Method of enforcing control of access by a device to a secure element, and corresponding secure element
EP2827274A1 (en) * 2013-07-17 2015-01-21 PT Oberthur Technologies Indonesia LTD. Method of enforcing control of access by a device to a secure element, and corresponding secure element
US12141804B2 (en) 2016-12-28 2024-11-12 Capital One Services, Llc Dynamic transaction card protected by multi- factor authentication
US12307457B2 (en) 2016-12-28 2025-05-20 Capital One Services, Llc Dynamic transaction card protected by multi-factor authentication
US12530937B2 (en) 2018-06-21 2026-01-20 Capital One Services, Llc Systems and methods for secure read-only authentication
US10878651B2 (en) 2018-06-21 2020-12-29 Capital One Services, Llc Systems and methods for secure read-only authentication
US10546444B2 (en) 2018-06-21 2020-01-28 Capital One Services, Llc Systems and methods for secure read-only authentication
US11556668B2 (en) 2018-07-12 2023-01-17 Capital One Services, Llc System and method for dynamic generation of URL by smart card
US11797710B2 (en) 2018-07-12 2023-10-24 Capital One Services, Llc System and method for dynamic generation of URL by smart card
US10769299B2 (en) 2018-07-12 2020-09-08 Capital One Services, Llc System and method for dynamic generation of URL by smart card
US12141795B2 (en) 2018-09-19 2024-11-12 Capital One Services, Llc Systems and methods for providing card interactions
US12288205B2 (en) 2018-09-19 2025-04-29 Capital One Services, Llc Systems and methods for providing card interactions
US10623393B1 (en) 2018-10-02 2020-04-14 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US12056560B2 (en) 2018-10-02 2024-08-06 Capital One Services, Llc Systems and methods for contactless card applet communication
US12489625B2 (en) 2018-10-02 2025-12-02 Capital One Services, Llc Systems and methods of key selection for cryptographic authentication of contactless cards
US12341897B2 (en) 2018-10-02 2025-06-24 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10542036B1 (en) 2018-10-02 2020-01-21 Capital One Services, Llc Systems and methods for signaling an attack on contactless cards
US10511443B1 (en) 2018-10-02 2019-12-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10554411B1 (en) 2018-10-02 2020-02-04 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10565587B1 (en) 2018-10-02 2020-02-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10581611B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10582386B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10579998B1 (en) 2018-10-02 2020-03-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10592710B1 (en) 2018-10-02 2020-03-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10607216B1 (en) 2018-10-02 2020-03-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10607214B1 (en) 2018-10-02 2020-03-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10615981B1 (en) 2018-10-02 2020-04-07 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11456873B2 (en) 2018-10-02 2022-09-27 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10630653B1 (en) 2018-10-02 2020-04-21 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11444775B2 (en) 2018-10-02 2022-09-13 Capital One Services, Llc Systems and methods for content management using contactless cards
US12493869B2 (en) 2018-10-02 2025-12-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US12261960B2 (en) 2018-10-02 2025-03-25 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10680824B2 (en) 2018-10-02 2020-06-09 Capital One Services, Llc Systems and methods for inventory management using cryptographic authentication of contactless cards
US10685350B2 (en) 2018-10-02 2020-06-16 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10686603B2 (en) 2018-10-02 2020-06-16 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11469898B2 (en) 2018-10-02 2022-10-11 Capital One Services, Llc Systems and methods for message presentation using contactless cards
US12166892B2 (en) 2018-10-02 2024-12-10 Capital One Services, Llc Systems and methods for message presentation using contactless cards
US10733645B2 (en) 2018-10-02 2020-08-04 Capital One Services, Llc Systems and methods for establishing identity for order pick up
US12155770B2 (en) 2018-10-02 2024-11-26 Capital One Services, Llc Systems and methods for user information management using contactless cards
US12154097B2 (en) 2018-10-02 2024-11-26 Capital One Services, Llc Systems and methods for phone-based card activation
US10748138B2 (en) 2018-10-02 2020-08-18 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10505738B1 (en) 2018-10-02 2019-12-10 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US12494915B2 (en) 2018-10-02 2025-12-09 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10771254B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for email-based card activation
US10771253B2 (en) 2018-10-02 2020-09-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10778437B2 (en) 2018-10-02 2020-09-15 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10783519B2 (en) 2018-10-02 2020-09-22 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10489781B1 (en) 2018-10-02 2019-11-26 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10797882B2 (en) 2018-10-02 2020-10-06 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US12125027B2 (en) 2018-10-02 2024-10-22 Capital One Services, Llc Systems and methods for performing transactions with contactless cards
US10841091B2 (en) 2018-10-02 2020-11-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11438164B2 (en) 2018-10-02 2022-09-06 Capital One Services, Llc Systems and methods for email-based card activation
US12112322B2 (en) 2018-10-02 2024-10-08 Capital One Services, Llc Systems and methods for user authorization and access to services using contactless cards
US10860814B2 (en) 2018-10-02 2020-12-08 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US12106341B2 (en) 2018-10-02 2024-10-01 Capital One Services, Llc Systems and methods for establishing identity for order pick up
US12079798B2 (en) 2018-10-02 2024-09-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US12081582B2 (en) 2018-10-02 2024-09-03 Capital One Services, Llc Systems and methods for signaling an attack on contactless cards
US12526149B2 (en) 2018-10-02 2026-01-13 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10880327B2 (en) 2018-10-02 2020-12-29 Capital One Services, Llc Systems and methods for signaling an attack on contactless cards
US12069178B2 (en) 2018-10-02 2024-08-20 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10887106B2 (en) 2018-10-02 2021-01-05 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11438311B2 (en) 2018-10-02 2022-09-06 Capital One Services, Llc Systems and methods for card information management
US10909527B2 (en) 2018-10-02 2021-02-02 Capital One Services, Llc Systems and methods for performing a reissue of a contactless card
US12056692B2 (en) 2018-10-02 2024-08-06 Capital One Services, Llc Systems and methods for secure transaction approval
US12026707B2 (en) 2018-10-02 2024-07-02 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10949520B2 (en) 2018-10-02 2021-03-16 Capital One Services, Llc Systems and methods for cross coupling risk analytics and one-time-passcodes
US12010238B2 (en) 2018-10-02 2024-06-11 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US10965465B2 (en) 2018-10-02 2021-03-30 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US12003490B2 (en) 2018-10-02 2024-06-04 Capital One Services, Llc Systems and methods for card information management
US11997208B2 (en) 2018-10-02 2024-05-28 Capital One Services, Llc Systems and methods for inventory management using cryptographic authentication of contactless cards
US10992477B2 (en) 2018-10-02 2021-04-27 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11989724B2 (en) 2018-10-02 2024-05-21 Capital One Services Llc Systems and methods for cryptographic authentication of contactless cards using risk factors
US11423452B2 (en) 2018-10-02 2022-08-23 Capital One Services, Llc Systems and methods for establishing identity for order pick up
US11974127B2 (en) 2018-10-02 2024-04-30 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11924188B2 (en) 2018-10-02 2024-03-05 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11843700B2 (en) 2018-10-02 2023-12-12 Capital One Services, Llc Systems and methods for email-based card activation
US11843698B2 (en) 2018-10-02 2023-12-12 Capital One Services, Llc Systems and methods of key selection for cryptographic authentication of contactless cards
US11102007B2 (en) 2018-10-02 2021-08-24 Capital One Services, Llc Contactless card emulation system and method
US11804964B2 (en) 2018-10-02 2023-10-31 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11502844B2 (en) 2018-10-02 2022-11-15 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11129019B2 (en) 2018-10-02 2021-09-21 Capital One Services, Llc Systems and methods for performing transactions with contactless cards
US11144915B2 (en) 2018-10-02 2021-10-12 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards using risk factors
US11544707B2 (en) 2018-10-02 2023-01-03 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11790187B2 (en) 2018-10-02 2023-10-17 Capital One Services, Llc Systems and methods for data transmission using contactless cards
US11182784B2 (en) 2018-10-02 2021-11-23 Capital One Services, Llc Systems and methods for performing transactions with contactless cards
US11182785B2 (en) 2018-10-02 2021-11-23 Capital One Services, Llc Systems and methods for authorization and access to services using contactless cards
US11195174B2 (en) 2018-10-02 2021-12-07 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11784820B2 (en) 2018-10-02 2023-10-10 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11770254B2 (en) 2018-10-02 2023-09-26 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11210664B2 (en) 2018-10-02 2021-12-28 Capital One Services, Llc Systems and methods for amplifying the strength of cryptographic algorithms
US11728994B2 (en) 2018-10-02 2023-08-15 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11699047B2 (en) 2018-10-02 2023-07-11 Capital One Services, Llc Systems and methods for contactless card applet communication
US11658997B2 (en) 2018-10-02 2023-05-23 Capital One Services, Llc Systems and methods for signaling an attack on contactless cards
US11232272B2 (en) 2018-10-02 2022-01-25 Capital One Services, Llc Systems and methods for contactless card applet communication
US11233645B2 (en) 2018-10-02 2022-01-25 Capital One Services, Llc Systems and methods of key selection for cryptographic authentication of contactless cards
US11610195B2 (en) 2018-10-02 2023-03-21 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11563583B2 (en) 2018-10-02 2023-01-24 Capital One Services, Llc Systems and methods for content management using contactless cards
US11297046B2 (en) 2018-10-02 2022-04-05 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11301848B2 (en) 2018-10-02 2022-04-12 Capital One Services, Llc Systems and methods for secure transaction approval
US11321546B2 (en) 2018-10-02 2022-05-03 Capital One Services, Llc Systems and methods data transmission using contactless cards
US11336454B2 (en) 2018-10-02 2022-05-17 Capital One Services, Llc Systems and methods for cryptographic authentication of contactless cards
US11341480B2 (en) 2018-10-02 2022-05-24 Capital One Services, Llc Systems and methods for phone-based card activation
US11349667B2 (en) 2018-10-02 2022-05-31 Capital One Services, Llc Systems and methods for inventory management using cryptographic authentication of contactless cards
US12125021B2 (en) 2018-12-18 2024-10-22 Capital One Services, Llc Devices and methods for selective contactless communication
US12260393B2 (en) 2018-12-18 2025-03-25 Capital One Services, Llc Devices and methods for selective contactless communication
US11361302B2 (en) 2019-01-11 2022-06-14 Capital One Services, Llc Systems and methods for touch screen interface interaction using a card overlay
US11037136B2 (en) 2019-01-24 2021-06-15 Capital One Services, Llc Tap to autofill card data
US10467622B1 (en) 2019-02-01 2019-11-05 Capital One Services, Llc Using on-demand applications to generate virtual numbers for a contactless card to securely autofill forms
US11120453B2 (en) 2019-02-01 2021-09-14 Capital One Services, Llc Tap card to securely generate card data to copy to clipboard
US10510074B1 (en) 2019-02-01 2019-12-17 Capital One Services, Llc One-tap payment using a contactless card
US10425129B1 (en) 2019-02-27 2019-09-24 Capital One Services, Llc Techniques to reduce power consumption in near field communication systems
US10523708B1 (en) 2019-03-18 2019-12-31 Capital One Services, Llc System and method for second factor authentication of customer support calls
US10535062B1 (en) 2019-03-20 2020-01-14 Capital One Services, Llc Using a contactless card to securely share personal data stored in a blockchain
US10984416B2 (en) 2019-03-20 2021-04-20 Capital One Services, Llc NFC mobile currency transfer
US10438437B1 (en) 2019-03-20 2019-10-08 Capital One Services, Llc Tap to copy data to clipboard via NFC
US10643420B1 (en) 2019-03-20 2020-05-05 Capital One Services, Llc Contextual tapping engine
US10783736B1 (en) 2019-03-20 2020-09-22 Capital One Services, Llc Tap to copy data to clipboard via NFC
US10970712B2 (en) 2019-03-21 2021-04-06 Capital One Services, Llc Delegated administration of permissions using a contactless card
US10467445B1 (en) 2019-03-28 2019-11-05 Capital One Services, Llc Devices and methods for contactless card alignment with a foldable mobile device
US11521262B2 (en) 2019-05-28 2022-12-06 Capital One Services, Llc NFC enhanced augmented reality information overlays
US10516447B1 (en) 2019-06-17 2019-12-24 Capital One Services, Llc Dynamic power levels in NFC card communications
US10871958B1 (en) 2019-07-03 2020-12-22 Capital One Services, Llc Techniques to perform applet programming
US11392933B2 (en) 2019-07-03 2022-07-19 Capital One Services, Llc Systems and methods for providing online and hybridcard interactions
US11694187B2 (en) 2019-07-03 2023-07-04 Capital One Services, Llc Constraining transactional capabilities for contactless cards
US12086852B2 (en) 2019-07-08 2024-09-10 Capital One Services, Llc Authenticating voice transactions with payment card
US10713649B1 (en) 2019-07-09 2020-07-14 Capital One Services, Llc System and method enabling mobile near-field communication to update display on a payment card
US10498401B1 (en) 2019-07-15 2019-12-03 Capital One Services, Llc System and method for guiding card positioning using phone sensors
US10885514B1 (en) 2019-07-15 2021-01-05 Capital One Services, Llc System and method for using image data to trigger contactless card transactions
US11182771B2 (en) 2019-07-17 2021-11-23 Capital One Services, Llc System for value loading onto in-vehicle device
US10733601B1 (en) 2019-07-17 2020-08-04 Capital One Services, Llc Body area network facilitated authentication or payment authorization
US10832271B1 (en) 2019-07-17 2020-11-10 Capital One Services, Llc Verified reviews using a contactless card
US11521213B2 (en) 2019-07-18 2022-12-06 Capital One Services, Llc Continuous authentication for digital services based on contactless card positioning
US10506426B1 (en) 2019-07-19 2019-12-10 Capital One Services, Llc Techniques for call authentication
US10541995B1 (en) 2019-07-23 2020-01-21 Capital One Services, Llc First factor contactless card authentication system and method
US11638148B2 (en) 2019-10-02 2023-04-25 Capital One Services, Llc Client device authentication using contactless legacy magnetic stripe data
US10701560B1 (en) 2019-10-02 2020-06-30 Capital One Services, Llc Client device authentication using contactless legacy magnetic stripe data
US12532170B2 (en) 2019-10-02 2026-01-20 Capital One Services, Llc Client device authentication using contactless legacy magnetic stripe data
US10733283B1 (en) 2019-12-23 2020-08-04 Capital One Services, Llc Secure password generation and management using NFC and contactless smart cards
US10657754B1 (en) 2019-12-23 2020-05-19 Capital One Services, Llc Contactless card and personal identification system
US11651361B2 (en) 2019-12-23 2023-05-16 Capital One Services, Llc Secure authentication based on passport data stored in a contactless card
US10862540B1 (en) 2019-12-23 2020-12-08 Capital One Services, Llc Method for mapping NFC field strength and location on mobile devices
US11615395B2 (en) 2019-12-23 2023-03-28 Capital One Services, Llc Authentication for third party digital wallet provisioning
US10885410B1 (en) 2019-12-23 2021-01-05 Capital One Services, Llc Generating barcodes utilizing cryptographic techniques
US11113685B2 (en) 2019-12-23 2021-09-07 Capital One Services, Llc Card issuing with restricted virtual numbers
US11200563B2 (en) 2019-12-24 2021-12-14 Capital One Services, Llc Account registration using a contactless card
US10664941B1 (en) 2019-12-24 2020-05-26 Capital One Services, Llc Steganographic image encoding of biometric template information on a card
US10853795B1 (en) 2019-12-24 2020-12-01 Capital One Services, Llc Secure authentication based on identity data stored in a contactless card
US10909544B1 (en) 2019-12-26 2021-02-02 Capital One Services, Llc Accessing and utilizing multiple loyalty point accounts
US10757574B1 (en) 2019-12-26 2020-08-25 Capital One Services, Llc Multi-factor authentication providing a credential via a contactless card for secure messaging
US11038688B1 (en) 2019-12-30 2021-06-15 Capital One Services, Llc Techniques to control applets for contactless cards
US10860914B1 (en) 2019-12-31 2020-12-08 Capital One Services, Llc Contactless card and method of assembly
US11455620B2 (en) 2019-12-31 2022-09-27 Capital One Services, Llc Tapping a contactless card to a computing device to provision a virtual number
US11210656B2 (en) 2020-04-13 2021-12-28 Capital One Services, Llc Determining specific terms for contactless card activation
US11222342B2 (en) 2020-04-30 2022-01-11 Capital One Services, Llc Accurate images in graphical user interfaces to enable data transfer
US11823175B2 (en) 2020-04-30 2023-11-21 Capital One Services, Llc Intelligent card unlock
US10915888B1 (en) 2020-04-30 2021-02-09 Capital One Services, Llc Contactless card with multiple rotating security keys
US11270291B2 (en) 2020-04-30 2022-03-08 Capital One Services, Llc Systems and methods for data access control using a short-range transceiver
US11030339B1 (en) 2020-04-30 2021-06-08 Capital One Services, Llc Systems and methods for data access control of personal user data using a short-range transceiver
US12205103B2 (en) 2020-04-30 2025-01-21 Capital One Services, Llc Contactless card with multiple rotating security keys
US12393926B2 (en) 2020-04-30 2025-08-19 Capital One Services, Llc Systems and methods for data access control using a short-range transceiver
US12174991B2 (en) 2020-04-30 2024-12-24 Capital One Services, Llc Systems and methods for data access control of personal user data using a short-range transceiver
US11562346B2 (en) 2020-04-30 2023-01-24 Capital One Services, Llc Contactless card with multiple rotating security keys
US10861006B1 (en) 2020-04-30 2020-12-08 Capital One Services, Llc Systems and methods for data access control using a short-range transceiver
US10963865B1 (en) 2020-05-12 2021-03-30 Capital One Services, Llc Augmented reality card activation experience
US11063979B1 (en) 2020-05-18 2021-07-13 Capital One Services, Llc Enabling communications between applications in a mobile operating system
US11100511B1 (en) 2020-05-18 2021-08-24 Capital One Services, Llc Application-based point of sale system in mobile operating systems
US12513123B2 (en) 2020-08-05 2025-12-30 Capital One Services, Llc Systems and methods for controlling secured data transfer via URLs
US11216623B1 (en) 2020-08-05 2022-01-04 Capital One Services, Llc Systems and methods for controlling secured data transfer via URLs
US11062098B1 (en) 2020-08-11 2021-07-13 Capital One Services, Llc Augmented reality information display and interaction via NFC based authentication
US11683325B2 (en) 2020-08-11 2023-06-20 Capital One Services, Llc Systems and methods for verified messaging via short-range transceiver
US12165149B2 (en) 2020-08-12 2024-12-10 Capital One Services, Llc Systems and methods for user verification via short-range transceiver
US11165586B1 (en) 2020-10-30 2021-11-02 Capital One Services, Llc Call center web-based authentication using a contactless card
US11482312B2 (en) 2020-10-30 2022-10-25 Capital One Services, Llc Secure verification of medical status using a contactless card
US11373169B2 (en) 2020-11-03 2022-06-28 Capital One Services, Llc Web-based activation of contactless cards
US11216799B1 (en) 2021-01-04 2022-01-04 Capital One Services, Llc Secure generation of one-time passcodes using a contactless card
US11682012B2 (en) 2021-01-27 2023-06-20 Capital One Services, Llc Contactless delivery systems and methods
US11792001B2 (en) 2021-01-28 2023-10-17 Capital One Services, Llc Systems and methods for secure reprovisioning
US11562358B2 (en) 2021-01-28 2023-01-24 Capital One Services, Llc Systems and methods for near field contactless card communication and cryptographic authentication
US12333531B2 (en) 2021-01-28 2025-06-17 Capital One Services, Llc Systems and methods for secure reprovisioning
US11922417B2 (en) 2021-01-28 2024-03-05 Capital One Services, Llc Systems and methods for near field contactless card communication and cryptographic authentication
US11438329B2 (en) 2021-01-29 2022-09-06 Capital One Services, Llc Systems and methods for authenticated peer-to-peer data transfer using resource locators
US11777933B2 (en) 2021-02-03 2023-10-03 Capital One Services, Llc URL-based authentication for payment cards
US11637826B2 (en) 2021-02-24 2023-04-25 Capital One Services, Llc Establishing authentication persistence
US20220311475A1 (en) 2021-03-26 2022-09-29 Capital One Services, Llc Network-enabled smart apparatus and systems and methods for activating and provisioning same
US12143515B2 (en) 2021-03-26 2024-11-12 Capital One Services, Llc Systems and methods for transaction card-based authentication
US11990955B2 (en) 2021-03-26 2024-05-21 Capital One Services, Llc Network-enabled smart apparatus and systems and methods for activating and provisioning same
US11848724B2 (en) 2021-03-26 2023-12-19 Capital One Services, Llc Network-enabled smart apparatus and systems and methods for activating and provisioning same
US11245438B1 (en) 2021-03-26 2022-02-08 Capital One Services, Llc Network-enabled smart apparatus and systems and methods for activating and provisioning same
US12160419B2 (en) 2021-04-15 2024-12-03 Capital One Services, Llc Authenticated messaging session with contactless card authentication
US11961089B2 (en) 2021-04-20 2024-04-16 Capital One Services, Llc On-demand applications to extend web services
US11935035B2 (en) 2021-04-20 2024-03-19 Capital One Services, Llc Techniques to utilize resource locators by a contactless card to perform a sequence of operations
US11902442B2 (en) 2021-04-22 2024-02-13 Capital One Services, Llc Secure management of accounts on display devices using a contactless card
US11354555B1 (en) 2021-05-04 2022-06-07 Capital One Services, Llc Methods, mediums, and systems for applying a display to a transaction card
US12301735B2 (en) 2021-06-18 2025-05-13 Capital One Services, Llc Systems and methods for contactless card communication and multi-device key pair cryptographic authentication
US12335412B2 (en) 2021-06-21 2025-06-17 Capital One Services, Llc Systems and methods for scalable cryptographic authentication of contactless cards
US12041172B2 (en) 2021-06-25 2024-07-16 Capital One Services, Llc Cryptographic authentication to control access to storage devices
US12061682B2 (en) 2021-07-19 2024-08-13 Capital One Services, Llc System and method to perform digital authentication using multiple channels of communication
US12495042B2 (en) 2021-08-16 2025-12-09 Capital One Services, Llc Systems and methods for resetting an authentication counter
US12062258B2 (en) 2021-09-16 2024-08-13 Capital One Services, Llc Use of a payment card to unlock a lock
US12069173B2 (en) 2021-12-15 2024-08-20 Capital One Services, Llc Key recovery based on contactless card authentication
US12166750B2 (en) 2022-02-08 2024-12-10 Capital One Services, Llc Systems and methods for secure access of storage
US12354077B2 (en) 2022-06-23 2025-07-08 Capital One Services, Llc Mobile web browser authentication and checkout using a contactless card
US12511654B2 (en) 2022-08-08 2025-12-30 Capital One Services, Llc Systems and methods for bypassing contactless payment transaction limit
US12354104B2 (en) 2022-08-09 2025-07-08 Capital One Services, Llc Methods and arrangements for proof of purchase
US12505450B2 (en) 2022-08-17 2025-12-23 Capital One Services, Llc Systems and methods for dynamic data generation and cryptographic card authentication
US12289396B2 (en) 2022-08-18 2025-04-29 Capital One Services, Llc Parallel secret salt generation and authentication for encrypted communication
US12147983B2 (en) 2023-01-13 2024-11-19 Capital One Services, Llc Systems and methods for multi-factor authentication using device tracking and identity verification
US12519652B2 (en) 2023-02-24 2026-01-06 Capital One Services, Llc System and method for dynamic integration of user-provided data with one-time-password authentication cryptogram
US12248832B2 (en) 2023-03-07 2025-03-11 Capital One Services, Llc Systems and methods for steganographic image encoding and identity verification using same
US12335256B2 (en) 2023-03-08 2025-06-17 Capital One Services, Llc Systems and methods for device binding authentication
US12511640B2 (en) 2023-03-13 2025-12-30 Capital One Services, Llc Systems and methods of managing password using contactless card
US12248928B2 (en) 2023-03-13 2025-03-11 Capital One Services, Llc Systems and methods of secure merchant payment over messaging platform using a contactless card
US12124903B2 (en) 2023-03-16 2024-10-22 Capital One Services, Llc Card with a time-sensitive element and systems and methods for implementing the same
US12299672B2 (en) 2023-03-30 2025-05-13 Capital One Services, Llc System and method for authentication with transaction cards
US12499432B2 (en) 2023-04-06 2025-12-16 Capital One Services, Llc Techniques to perform operations with a contactless card when in the presence of a trusted device
US12200135B2 (en) 2023-06-13 2025-01-14 Capital One Services, Llc Contactless card-based authentication via web-browser
US12505448B2 (en) 2023-08-09 2025-12-23 Capital One Services, Llc Systems and methods for fraud prevention in mobile application verification device enrollment process
US12511638B2 (en) 2023-09-07 2025-12-30 Capital One Services, Llc Assignment of near-field communications applets

Also Published As

Publication number Publication date
GB0720297D0 (en) 2007-11-28

Similar Documents

Publication Publication Date Title
GB2457221A (en) Smart Card Web Server (SCWS) administration within a plurality of security domains
EP2211480B1 (en) Wireless communication device for providing at least one near field communication service
US9843674B2 (en) Managing selection and triggering of applications on a card computing device
US8843122B1 (en) Mobile phone controls preprocessor
US9817993B2 (en) UICCs embedded in terminals or removable therefrom
US8984592B1 (en) Enablement of a trusted security zone authentication for remote mobile device management systems and methods
EP2731381B1 (en) Method for changing the mobile network operator in an embedded sim on basis of special privilege
US8126506B2 (en) System and method for securely managing data stored on mobile devices, such as enterprise mobility data
US8942672B2 (en) Mobile integrated distribution and transaction system and method for NFC services, and a mobile electronic device thereof
KR101701668B1 (en) Method for accessing a service, corresponding device and system
EP2984559A1 (en) Providing a native desktop using cloud-synchronized data
EP2909786A1 (en) Controlling mobile device access to secure data
KR101979162B1 (en) Method for Managing Key of Embedded SIM, Embedded SIM and recording medium for the same
CN108028749A (en) Apparatus, method and system for virtualizing reprogrammable universal integrated circuit chips
WO2013098117A1 (en) A method to manage contactless communication in a user device
CN105825134A (en) Intelligent card processing method, intelligent card management server and terminal
WO2015008167A2 (en) A moblie integrated distribution and transaction system and method for nfc services, and a mobile electronic device thereof
US11838985B2 (en) Policy-based management of embedded subscriber identity module (eSIM) profiles
Sabt et al. Over-the-internet: efficient remote content management for secure elements in mobile devices
Sugano et al. Advances with Osaifu Keitai—Starting Services Supporting NFC (Type A/B) on NTT DOCOMO UIM Cards—
Benyó et al. A novel virtual machine based approach for hosting NFC services on mobile devices
Roy et al. Universal Sim Card using TSM
Singh Mobile Application Profiling using Secure Element
WO2012000805A1 (en) Method of regulating interaction between two web sites

Legal Events

Date Code Title Description
AT Applications terminated before publication under section 16(1)
S20A Reinstatement of application (sect. 20a/patents act 1977)

Free format text: REQUEST FOR REINSTATEMENT ALLOWED

Effective date: 20090610

Free format text: REQUEST FOR REINSTATEMENT FILED

Effective date: 20090528

WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)