RFCYBER CORPORATION Patent applications |
Patent application number | Title | Published |
20140031024 | Method and system for providing controllable trusted service manager - Techniques for realizing or providing controllable trusted service management are disclosed. The techniques are related to empowering a service provider with application provisioning and applet and secure element (SE) management capabilities. A service management module, herein referred to as Controllable TSM or CTSM, is provided to a service provider to provision certain applications distributed through the service provider. A system or platform contemplated in this invention allows a service provider to operate under a supplementary security domain (SSD) installed by an SE issuer or an updated SSD key set exclusively known to the service provider. Such a platform is designed to support embedded SE (eSE) and can be extended to support UICC-based SE. With the CTSM, a service provider can use the SSD to personalize applets installed on each SE securely and independently. | 01-30-2014 |
20140006194 | Method and apparatus for settling payments using mobile devices | 01-02-2014 |
20130178159 | Method and apparatus for emulating multiple cards in mobile devices - Techniques for mobile devices configured to support or function as multiple contactless cards, such as Mifare contactless cards, are disclosed. According to one embodiment, a mobile device embedded with an emulator is loaded with a plurality of software modules or applications, each emulating one card or one type of contactless cards. An emulator is implemented in a secure element that is personalized for a user of the mobile device while the applications are respectively provisioned via their respective providers per the personalized secure element. When the mobile device is to be used as a contactless card to perform a monetary function, a corresponding application is loaded into and executed in the emulator. When the mobile device is to be used to perform another monetary function, a corresponding application is loaded into the emulator to replace the previous application entirely or partially in the emulator. As a result, the mobile device can be used as a monetary device in lieu of multiple contactless cards. | 07-11-2013 |
20130139230 | Trusted Service Management Process - Techniques for providing trusted management services (TSM) are described. According to one aspect of the techniques, a secure element (SE) is personalized via the TSM. A process is provided to personalize an SE with multiple parties involved and orchestrated by a party or a business running the TSM, hence as a trusted service manager (TSM). The TSM brings the parties together to recognize the SE being personalized so that subsequent transactions can be authorized and carried out with a device embedded with the SE. In operation, each of the parties may load a piece of data into the SE, including registration information, various services or application data, and various keys so that subsequent transactions can be carried out with or via an authorized party and in a secured and acknowledgeable manner. | 05-30-2013 |