$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for facilitating memory and application management on a secured token 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06K-019/06
출원번호 US-0310748 (2002-12-04)
발명자 / 주소
  • Levy,Philippe
  • Hammad,Ayman
  • Simcox,Virginia I.
  • Sloan,Jerry
  • Gorden,Mary
출원인 / 주소
  • Visa U.S.A. Inc.
대리인 / 주소
    Townsend & Townsend & Crew LLP
인용정보 피인용 횟수 : 98  인용 특허 : 89

초록

초록이 없습니다.

대표청구항

대표청구항이 없습니다.

이 특허에 인용된 특허 (89)

  1. Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
  2. Draeger Juergen (Tbingen DEX) Paret Guenter (Herrenberg DEX), Activating circuit for modifying or adding a new program to an electronic device.
  3. Hayakawa Tomihiro (Sayama JPX), Adapter for integrated circuit device, and data transmission system using the same.
  4. Ketcham Carl, Apparatus and method for authentication and encryption of a remote terminal over a wireless link.
  5. Kanevsky Dimitri ; Maes Stephane Herman, Apparatus and methods for speaker verification/identification/classification employing non-acoustic and/or acoustic mo.
  6. Chen James F. (Potomac MD) Wang Jieh-Shan (Potomac MD), Application level security system and method.
  7. Russell Edward A. (Acton MA), Authorization system for obtaining in single step both identification and access rights of client to server directly fro.
  8. Burger Paul M., Biometric authentication system.
  9. Hoshino Masao (Kawasaki JPX), Card type storage medium and card type storage medium issuing apparatus.
  10. De Jong Eduard Karel,NLX, Coherent data structure with multiple interaction contexts for a smart card.
  11. de Jong Eduard Karel,NLX, Coherent data structure with multiple interaction contexts for a smart card.
  12. Varadharajan Vijay,AUX ; Dack David George,GB2, Communication system for portable appliances.
  13. Nukui Harumi (Kanagawa JPX), Computer network capable of accessing file remotely between computer systems.
  14. Barlow Douglas C. (Redmond WA), Computer network operating with multilevel hierarchical security with selectable common trust realms and corresponding s.
  15. Lapointe Brian K. (53 Jerdens La. Rockport MA 01966) Lapointe James A. (43 Ledgewood Dr. Danvers MA 01923), Computer security system.
  16. O'Toole ; Jr. James W. ; Gifford David K., Controlled transfer of information in computer networks.
  17. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  18. Bellovin Steven M. (Westfield NJ) Merritt Michael (Berkeley Heights NJ), Cryptographic protocol for secure communications.
  19. Taylor Douglas C. (New York NY), Data card that can be used for transactions involving separate card issuers.
  20. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  21. Jones, Julian Hamilton; Lambert, Howard Shelton; Orchard, James Ronald Lewis, Data processing system using active tokens and method for controlling such a system.
  22. Wagner Richard Hiers, Editor for developing statements to support i/o operation on open network using segregator for segregating protocol sta.
  23. Hardy Ann Ewing ; Hardy Norman ; Tribble E. Dean, Electronic authority server.
  24. Krajewski ; Jr. Marjan (Acton MA) Chipchak John C. (Dracut MA) Chodorow David A. (Groton MA) Trostle Jonathan T. (Lexington MA) Baldwin Peter T. (Rowley MA), Electronic information network user authentication and authorization system.
  25. Wang Ynjiun Paul, Electronic transaction systems and methods therefor.
  26. Haff Maurice W. ; Clarke Christopher D., File transfer system using dynamically assigned ports.
  27. Rovin George H. (Ojai Valley School ; 723 El Paseo Rd. Ojai CA 93023), IC card system with removable IC modules.
  28. Clark Paul C., Intelligent token protected system with network authentication.
  29. Howarth David I. (Middlesex MA), Keyring metaphor for user\s security keys on a distributed multiprocess data system.
  30. Kocher Paul C. ; Jaffe Joshua M., Leak-resistant cryptographic method and apparatus.
  31. Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
  32. Misra Pradyumna K. ; Miller Arnold S. ; Ward Richard B., Logon certification.
  33. Takahashi Masashi (Tokyo JPX) Ikegami Takashi (Yokosuka JPX), Memory card.
  34. Lee Robert D. ; Curry Stephen M. ; Bolan Michael L. ; Kurkowski Hal ; Diaz Donald R. ; Scherpenberg Francis A. ; Peirling Kevin E., Metal token having units of value stored therein using a single wire communication method.
  35. Gupta Abhay ; Ferris Chris ; Abdelnur Alejandro, Method and apparatus for authenticating users.
  36. Aziz Ashar (Fremont CA), Method and apparatus for key-management scheme for use with internet protocols at site firewalls.
  37. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media.
  38. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  39. Kaufman Charles W. (Northboro MA) Gasser Morrie (Hopkinton MA) Lampson Butler W. (Cambridge MA) Tardo Joseph J. (Concord MA) Alagappan Kannan (Cambridge MA), Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.
  40. Weiss Kenneth P. (Newton MA), Method and apparatus for utilizing a token for resource access.
  41. Kaufman James Harvey ; Sincerbox Glenn Tavernia, Method and means for limiting adverse use of counterfeit credit cards, access badges, electronic accounts or the like.
  42. Iijima Yasuo (Yokohama JPX), Method and system for allocating file area in memory area of IC card.
  43. Hamdy-Swink Kathryn Anne, Method and system for communication access restriction.
  44. Smart David C. ; Cipolla David, Method for archiving film unit information.
  45. Wlodarczyk, Lukasz, Method for authenticating the result of an instruction in a token.
  46. Angelo Michael F. ; Collins David L. ; Kim Donald D. ; Jansen Kenneth A., Method for securely communicating remote control commands in a computer network.
  47. Mittermayer Josef,DEX ; Moreira Alberto,DEX, Method of processing spotlight SAR raw data.
  48. Drupsteen Michel Marco Paul,NLX, Method of securely loading commands in a smart card.
  49. Zizzi Stephen, Method of transparent encryption and decryption for an electronic document management system.
  50. Hohle William ; Petit Frederic, Methods and apparatus for a travel-related multi-function smartcard.
  51. Hohle William, Methods and apparatus for dynamic smartcard synchronization and personalization.
  52. Chen James F. ; Wang Jieh-Shan ; Brook Christopher T. ; Garvey Francis, Multi-access virtual private network.
  53. Chen James F. ; Wang Jieh-Shan ; Brook Christopher T. ; Garvey Francis, Multi-access virtual private network.
  54. Everett David Barrington,GBX ; Miller Stuart James,GBX ; Peacham Anthony David,GBX ; Simmons Ian Stephen,GBX ; Richards Timothy Philip,GBX ; Viner John Charles,GBX, Multi-application IC card with delegation feature.
  55. Le Roux Jean-Yves (La Ciotat FRX), Multi-applications portable card for personal computer.
  56. Wagner Richard Hiers, Open network system for I/O operations with non-standard I/O devices utilizing extended protocol including device identi.
  57. Northington Cathy C. ; Goodson Louis J., Open-architecture system for real-time consolidation of information from multiple financial systems.
  58. Linehan Mark H. (Yorktown Heights NY) Simicich Nicholas J. (Boca Raton FL) Tsudik Gene Y. (Thalwil CHX), Personal key archive.
  59. Bradney Monty T. ; Stairhime ; Jr. Walter L. ; Reid Herbert Wayne ; Warfel George, Personal verification in a commercial transaction system.
  60. Iijima Yasuo (Yokohama JPX), Portable electronic apparatus having key data for limiting memory access.
  61. Kuriyama Ryouichi (Yokosuka JPX), Portable electronic device and a method for processing data therefore.
  62. Maes Stephane Herman ; Sedivy Jan,CSX, Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security.
  63. Boerbert William E. (Minneapolis MN), Secure computer interface.
  64. Benhammou Jean-Pierre ; Baran Dennis F. ; Tonge Phillip D. ; Terry ; Jr. Edward L., Secure memory having multiple security levels.
  65. Rinaldo DiGiorgio ; Michael S. Bender, Secure token device access to services provided by an internet service provider (ISP).
  66. Bruwer Frederick Johannes,ZAX ; Pretorius Pieter Jacobus,ZAX ; Dippenaar Theodor Johannes,ZAX, Secure token integrated circuit and method of performing a secure authentication function or transaction.
  67. Carlisle William Reid (Morristown NJ) Curtis Lydia Anne (Bridgewater NJ) Murphy Kathleen M. (Bedminster NJ) Skibo Richard John (Skillman NJ), Smart card with multiple charge accounts and product item tables designating the account to debit.
  68. Fehrman R. David ; Thaxton Daniel David ; Hileman Martin H. ; Wilkinson Patrick Fitzgerald, Smart card with replaceable chip.
  69. Griswold, Chauncey Warner; Hedrick, Joseph R., Smart token.
  70. Mandelbaum Richard (Manalapan NJ) Sherman Stephen A. (Hackettstown NJ) Wetherington Diane R. (Bernardsville NJ), Smartcard adapted for a plurality of service providers and for remote installation of same.
  71. Hamann Ernst-Michael,DEX ; Kaisser Michael,DEX, Storing data objects in a smart card memory.
  72. Nakamura Lance S. ; Roberts Alan B. ; Sheets John F.,FRX, System and method for revaluation of stored tokens in IC cards.
  73. Spies Terence R. ; Simon Daniel R., System and method for secure purchase and delivery of video content programs.
  74. Wagner Richard Hiers, System for extending present open network communication protocols to communicate with non-standard I/O devices directly.
  75. Kaufman Charles W. (Northborough MA) Pearlman Radia J. (Acton MA) Gasser Morrie (Hopkinton MA), System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authe.
  76. Clark Paul C. (4705 Broad Brook Dr. Bethesda MD 20814), System for protecting computers via intelligent tokens or smart cards.
  77. Nguyen Trong ; Subramanian Mahadevan P. ; Haller Daniel R., System, method and article of manufacture for a gateway system architecture with system administration information acce.
  78. Rowney Kevin T. B., System, method and article of manufacture for conditionally accepting a payment method utilizing an extensible, flexible.
  79. Weber Jay C. ; Rowney Kevin T. B. ; Kramer Glenn A., System, method and article of manufacture for exchanging software and configuration data over a multichannel, extensible, flexible architecture.
  80. Williams Humphrey ; Hughes Kevin ; Parmar Bipinkumar G., System, method and article of manufacture for network electronic authorization utilizing an authorization instrument.
  81. Rowney Kevin T. B. ; Chen Yuhua, System, method and article of manufacture for secure digital certification of electronic commerce.
  82. Michaels Wayne David,GBX ; Timson Anthony Richard,GBX ; Dervan Aden William,GBX, Telecommunications system with value added service directory and an integrated circuit module therefor.
  83. Pare ; Jr. David Ferrrin ; Lee Jonathan Alexander ; Hoffman Ned, Tokenless biometric transaction authorization system.
  84. Pare ; Jr. David Ferrin ; Hoffman Ned ; Lee Jonathan Alexander, Tokenless identification of individuals.
  85. Hoffman Ned (Berkeley CA) Pare ; Jr. David F. (Berkeley CA) Lee Jonathan A. (Berkeley CA), Tokenless identification system for authorization of electronic transactions and electronic transmissions.
  86. Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC), Transaction system security method and apparatus.
  87. Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC), Transaction system security method and apparatus.
  88. Haverty Rand,CAX, User authentification using a virtual private key.
  89. Wilkinson Timothy J.,GBX ; Guthery Scott B. ; Krishna Ksheerabdhi ; Montgomery Michael A., Using a high level programming language with a microcontroller.

이 특허를 인용한 특허 (98)

  1. Hachey, John, Anti-interrogation for portable device.
  2. Oh, Yun-sang; Kim, Tae-sung; Kim, Shin-han; Jung, Kyung-im, Apparatus and method for operating plural applications between portable storage device and digital device.
  3. Hammad, Ayman; Dixon, Phil, Apparatus and method to electromagnetically shield portable consumer devices.
  4. Hammad, Ayman; Dixon, Phil, Apparatus and method to electromagnetically shield portable consumer devices.
  5. Hammad,Ayman; Dixon,Phil, Apparatus and method to electromagnetically shield portable consumer devices.
  6. Carlson, Mark, Communication device including multi-part alias identifier.
  7. Wentker, Dave; Wong, Erick; Shenker, Gavin; Deibert, Doug, Contactless transaction.
  8. Carlson, Mark, Coupon offers from multiple entities.
  9. Carlson, Mark, Coupon offers from multiple entities.
  10. Hertel, Philipp; Hertel, Alexander W.; Walfish, Sheldon I., Detecting a communication tap via signal monitoring.
  11. Hertel, Philipp; Hertel, Alexander W.; Walfish, Sheldon I., Detecting a communication tap via signal monitoring.
  12. von Behren, Rob; Wall, Jonathan, Digital wallet.
  13. von Behren, Rob; Wall, Jonathan, Digital wallet.
  14. Manessis, Thomas; Gerber, Gary, Dynamic payment device characteristics.
  15. Manessis, Thomas; Gerber, Gary, Dynamic payment device characteristics.
  16. Zarakas, James; York, Brennon, Dynamic transaction card optimization.
  17. Wurmfeld, David; Locke, Tyler; Koeppel, Adam, Dynamic transaction card with EMV interface and method of manufacturing.
  18. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a central trusted service manager.
  19. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a central trusted service manager.
  20. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a central trusted service manager.
  21. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a key escrow service.
  22. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a key escrow service.
  23. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a key escrow service.
  24. Patterson, Barbara, Host capture.
  25. Paatero, Lauri; Cofta, Piotr, Key storage administration.
  26. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem, Local trusted services manager for a contactless smart card.
  27. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem, Local trusted services manager for a contactless smart card.
  28. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem, Local trusted services manager for a contactless smart card.
  29. Hammad, Ayman; Faith, Patrick, Location based authentication.
  30. Hammad, Ayman; Faith, Patrick, Location based authentication.
  31. Hong, Jiang; Wei, Ke, Managing access to a document-processing device using an identification token.
  32. Hong, Jiang; Wei, Ke, Managing access to a document-processing device using an identification token.
  33. Levy, Philippe; Hammad, Ayman; Simcox, Virginia I.; Sloan, Jerry; Gorden, Mary, Method and system for facilitating memory and application management on a secured token.
  34. Levy, Philippe; Hammad, Ayman; Simcox, Virginia; Sloan, Jerry; Gorden, Mary, Method and system for facilitating memory and application management on a secured token.
  35. Hammad, Ayman; Faith, Patrick; Aabye, Christian; Sahota, Jagdeep Singh, Method and system for generating a dynamic verification value.
  36. Hammad, Ayman; Faith, Patrick; Aabye, Christian; Sahota, Jagdeep Singh, Method and system for generating a dynamic verification value.
  37. Monk, Justin T., Method and system for handling returned prepaid payment cards.
  38. Seaton, Jr., Robert W.; Spielman, Terence; Cornwell, Penny; Blackwood, Neal; Clay, Michael T., Method and system for secure authentication.
  39. Seaton, Jr., Robert W.; Spielman, Terence; Cornwell, Penny; Blackwood, Neal; Clay, Michael T., Method and system for secure authentication.
  40. Faith, Patrick; Hammad, Ayman, Method and system using candidate dynamic data elements.
  41. Faith, Patrick; Hammad, Ayman, Method and system using candidate dynamic data elements.
  42. Aabye, Christian; Ngo, Hao; Wilson, David, Method of performing transactions with contactless payment devices using pre-tap and two-tap operations.
  43. Carlson, Mark; Ciurea, Peter, Mobile coupon method and system.
  44. Wentker, Dave; Wong, Erick; Shenker, Gavin; Deibert, Doug, Mobile payment management.
  45. Yuzon, Ryan; Hammad, Ayman, Multifunction removable cover for portable payment device.
  46. Yuzon, Ryan; Hammad, Ayman, Multifunction removable cover for portable payment device.
  47. Wall, Jonathan; von Behren, Rob; Colline, II, Raymond Emmett, One-click offline buying.
  48. Wall, Jonathan; von Behren, Rob; Colline, II, Raymond Emmett, One-click offline buying.
  49. Aabye, Christian; Ngo, Hao; Wilson, David William; Zeiden, Gustavo Mariath; Pitchford, Chris; Pirzadeh, Kiushan, Over the air update of payment transaction data stored in secure memory.
  50. Aabye, Christian; Ngo, Hao; Wilson, David William; Zeiden, Gustavo Mariath; Pitchford, Chris; Pirzadeh, Kiushan, Over the air update of payment transaction data stored in secure memory.
  51. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem; Muehlberg, Alexej; Meyn, Hauke, Partitioning the namespace of a contactless smart card.
  52. von Behren, Rob; Wall, Jonathan; Muehlberg, Alexej; Meyn, Hauke, Payment application lifecycle management in a contactless smart card.
  53. Wall, Jonathan; Behren, Rob von; Paya, Ismail Cem, Point of sale processing initiated by a single tap.
  54. Monk, Justin T., Portability of financial tokens.
  55. Hammad, Ayman; Faith, Patrick, Portable consumer device verification system.
  56. Hammad, Ayman; Faith, Patrick, Portable consumer device verification system.
  57. Jooste, Sarel Kobus; Joseph, John; Farmer, Shane Alexander, Portable secure element.
  58. Jooste, Sarel Kobus; Joseph, John; Farmer, Shane Alexander, Portable secure element.
  59. Monk, Justin T., Prepaid card fraud and risk management.
  60. Monk, Justin T., Prepaid negative balance fee processing and fee diversion.
  61. Granucci, Nicole Janine; Vriheas, Carrie Elaine; Hammad, Ayman, Real-time balance on a mobile phone.
  62. Granucci, Nicole Janine; Vriheas, Carrie Elaine; Hammad, Ayman A., Real-time balance on a mobile phone.
  63. Carlson, Mark; Hammad, Ayman; Faith, Patrick, Real-time balance updates.
  64. Aabye, Christian; Ngo, Hao; Wilson, David William; Mangiagalli, Guido, Recordation of electronic payment transaction information.
  65. Nguyen, Loc Duc; Nelson, Chris S.; Quach, Charles, Resource location verification by comparing and updating resource location with a location of a consumer device after a threshold of location mismatches is exceeded.
  66. von Behren, Rob; Wall, Jonathan; Muehlberg, Alexej; Meyn, Hauke, Routing secure element payment requests to an alternate application.
  67. Wakerly, Michael John; Wall, Jonathan, Secure application directory.
  68. Wakerly, Michael John; Wall, Jonathan, Secure application directory.
  69. Wakerly, Michael John; Wall, Jonathan, Secure application directory.
  70. Wall, Jonathan; von Behren, Rob, Secure reset of personal and service provider information on mobile devices.
  71. Wall, Jonathan; von Behren, Rob, Secure reset of personal and service provider information on mobile devices.
  72. Hammad, Ayman, Shielding of portable consumer device.
  73. Hong, Jiang; Wang, Sam; Wei, Ke, Smart card authentication system with multiple card and server support.
  74. Hochfield, Barry Sim, Smartcard system.
  75. Hurry, Simon; Aabye, Christian, System and method for account identifier obfuscation.
  76. Manessis, Thomas, System and method for authorizing financial transactions with online merchants.
  77. Zarakas, James; Wurmfeld, David; York, Brennon; Locke, Tyler, System and methods for secure firmware validation.
  78. Zarakas, James; Wurmfeld, David; York, Brennon; Locke, Tyler, System and methods for secure firmware validation.
  79. Monk, Justin T., System, apparatus and methods for comparing fraud parameters for application during prepaid card enrollment and transactions.
  80. Monk, Justin T., System, apparatus and methods for comparing fraud parameters for application during prepaid card enrollment and transactions.
  81. Wurmfeld, David; Locke, Tyler, System, method, and apparatus for a dynamic transaction card.
  82. Monk, Justin T., Systems and methods for automatic migration of a consumer between financial accounts.
  83. Monk, Justin T., Systems and methods for automatic migration of a consumer between financial accounts.
  84. Bishop, Fred; Saunders, Peter D., Systems and methods for managing multiple accounts on a RF transaction device using secondary identification indicia.
  85. Carlson, Mark; Faith, Patrick, Systems and methods for visual representation of offers.
  86. Wurmfeld, David; Zarakas, James; Markson, Theodore; Sangi, Saleem; Locke, Tyler; Kelly, Kevin, Tamper-resistant dynamic transaction card and method of providing a tamper-resistant dynamic transaction card.
  87. Wurmfeld, David; Zarakas, James; Markson, Theodore; Sangi, Saleem; Locke, Tyler; Kelly, Kevin, Tamper-resistant transaction card and method of providing a tamper-resistant transaction card.
  88. Hammad, Ayman, Track data encryption.
  89. Hammad, Ayman, Track data encryption.
  90. Hammad, Ayman, Track data encryption.
  91. Patterson, Barbara Elizabeth, Transaction processing using a global unique identifier.
  92. Patterson, Barbara Elizabeth, Transaction processing using a global unique identifier.
  93. Patterson, Barbara Elizabeth, Transaction processing using a global unique identifier.
  94. Lehew, Christian R.; Pyle, Harry S.; Fang, Nicholas Jie, Trusted network transfer of content using off network input code.
  95. Lehew, Christian R.; Pyle, Harry S.; Fang, Nicholas Jie, Trusted network transfer of content using off network input code.
  96. von Behren, Rob; Wall, Jonathan; Muehlberg, Alexej; Meyn, Hauke, Wallet application for interacting with a secure element application without a trusted server for authentication.
  97. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem; Muehlberg, Alexej; Meyn, Hauke, Writing application data to a secure element.
  98. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem; Muehlberg, Alexej; Meyn, Hauke, Writing application data to a secure element.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로