Electronic ink for identity card
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving an authentication request by a security card;
performing an authentication operation by the security card;
displaying secure information through an electronic ink display of the security card in response to the authentication operation being successful.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for an identity card with improved security features. The identity card can have a programmable display. The display can be used to display sensitive data under defined circumstances. The card may have an interactive interface to receive input from a user. The card may also have a input/output interface to allow the exchange of data from the card to an external device. These elements can be used together to give a holder of a card control over the access to the data in the card and thwart counterfeiting and identity theft.
47 Citations
22 Claims
-
1. A computer-implemented method comprising:
-
receiving an authentication request by a security card; performing an authentication operation by the security card; displaying secure information through an electronic ink display of the security card in response to the authentication operation being successful. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A device comprising:
-
a housing; an electronic ink display coupled to the housing to provide a static display of information; and a processor coupled to the electronic ink display to drive the electronic ink display in response to an authentication operation being successful. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A machine readable medium, having instructions stored therein, which when executed, cause a machine to perform a set of instructions comprising:
-
receiving an authentication request by a security card; performing an authentication operation by the security card; displaying secure information through an electronic ink display of the security card in response to the authentication operation being successful. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
-
Specification