SMARTCARDS FOR SECURE TRANSACTION SYSTEMS
First Claim
1. A method for programming a secured smartcard, comprising:
- maintaining an encrypted mapping on the smartcard, wherein the encrypted mapping is accessible using one or more encryption keys;
providing a reference mapping and a development key to a developer;
receiving one or more data files and an edited version of the reference mapping from the developer;
updating the encrypted mapping based on the reference mapping; and
storing the one or more data files on the smartcard according to the updated encrypted mapping, wherein structure and content of the encrypted mapping file are concealed from the developer.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for programming a secured smartcard are described. An encrypted mapping is stored on the smartcard and is accessible using encryption keys, each encryption key providing an access level to the content of the mapping, providing a reference mapping and a development key to a developer. The developer may provide data files and an edited version of the reference mapping. The encrypted mapping can then be updated and the files stored on the smartcard according to the updated encrypted mapping. The developer need not know the structure and content of the encrypted mapping file. The data file may include a biometric template corresponding to an authorized user of the smartcard. The data file may additionally or alternatively comprise an application that can access encrypted files on the smartcard even if the developer of the application cannot access those same files.
185 Citations
20 Claims
-
1. A method for programming a secured smartcard, comprising:
-
maintaining an encrypted mapping on the smartcard, wherein the encrypted mapping is accessible using one or more encryption keys; providing a reference mapping and a development key to a developer; receiving one or more data files and an edited version of the reference mapping from the developer; updating the encrypted mapping based on the reference mapping; and storing the one or more data files on the smartcard according to the updated encrypted mapping, wherein structure and content of the encrypted mapping file are concealed from the developer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification