BLUETOOTH ENABLED CREDIT CARD WITH A LARGE DATA STORAGE VOLUME
First Claim
Patent Images
1. A smart card comprising:
- a mass storage for storing private data corresponding to a user; and
a processor, coupled to the memory, to;
receive a request from an application requesting access to the private data;
in response to the request;
process biometric data corresponding to the user to authenticate the user as an authorized user of the private data; and
when the user is authenticated, provide the private data to the application.
0 Assignments
0 Petitions
Accused Products
Abstract
A smart card is disclosed which includes a mass storage memory for storing biometric information of a user and private data. A radio is used as an interface to the card. When the user of the card wishes to invoke an application for the private data, biometric information about the user is provided to a device in communication with the card, enabling the card to authenticate the user as an authorized user of the private data, and in response to that authentication provide the data to the application in a manner that maintains privacy and integrity of data.
-
Citations
21 Claims
-
1. A smart card comprising:
-
a mass storage for storing private data corresponding to a user; and a processor, coupled to the memory, to; receive a request from an application requesting access to the private data; in response to the request; process biometric data corresponding to the user to authenticate the user as an authorized user of the private data; and when the user is authenticated, provide the private data to the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for securing data on a smart card comprising:
-
receiving, by at least one computing device, a request from an application requesting access to private data stored in a mass storage of a smart card; in response to the request; processing, by the at least one computing device, biometric data corresponding to the user to authenticate the user as an authorized user of the private data; and when the user is authenticated, provide the private data to the application. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification