Method and system for facilitating memory and application management on a secured token
First Claim
Patent Images
1. A system comprising:
- a client including a first application; and
a secured token including at least one applet, the applet providing a set of common commands and operable to be instantiated to create at least a first applet instance for the first application, the first applet instance utilizing at least one of the set of common commands provided by the applet used to create the first applet instance, the secured token further providing specification logic configured to allow specification of a first file structure for the first applet instance,wherein the applet is further operable to instantiate a second applet instance for a second application, the specification logic further allowing a second file structure to be specified for the second application such that different first and second file structures are used to store application data for the first and second applications in the secured token.
1 Assignment
0 Petitions
Accused Products
Abstract
A system including a secured token having a plurality of applets. Each applet supports a plurality of commands and is capable of being instantiated to create one or more applet instances. Each applet instance is capable of supporting the same plurality of commands that is supported by the applet that creates that applet instance. The applet instances can provide different file structures or different access conditions for data on the secured token.
-
Citations
31 Claims
-
1. A system comprising:
-
a client including a first application; and a secured token including at least one applet, the applet providing a set of common commands and operable to be instantiated to create at least a first applet instance for the first application, the first applet instance utilizing at least one of the set of common commands provided by the applet used to create the first applet instance, the secured token further providing specification logic configured to allow specification of a first file structure for the first applet instance, wherein the applet is further operable to instantiate a second applet instance for a second application, the specification logic further allowing a second file structure to be specified for the second application such that different first and second file structures are used to store application data for the first and second applications in the secured token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A secured token including at least one applet, the applet providing a set of common commands and operable to be instantiated to create at least a first applet instance for a first application, the first applet instance utilizing at least one of the set of common commands provided by the applet used to create the first applet instance, the secured token providing specification logic configured to allow specification of a first file structure for the first applet instance,
wherein the applet is further operable to instantiate a second applet instance for a second application the specification logic further allowing a second file structure to be specified for the second application such that different first and second file structures are used to store application data for the first and second applications in the secured token.
-
21. A method comprising:
-
providing at least one applet on a secured token, the applet providing a set of common commands and operable to be instantiated to create at least a first applet instance for a first application, the first applet instance utilizing at least one of the set of common commands provided by the applet used to create the first applet instance, the secured token further providing specification logic configured to allow specification of a first file structure for the first applet instance; and instantiating a second applet instance for a second application, the specification logic further allowing a second file structure to be specified for the second application such that different first and second file structures are used to store application data for the first and second applications in the secured token. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification