Secure element as a digital pocket
First Claim
1. A system comprising:
- a secure element configured to wirelessly communicate with an associated host device, the secure element including a set of consistent virtual resources used to map a set of available resources based on a model architecture, the set of available resources variable based on one or more of the model architecture and resources associated with a host device, the set of consistent virtual resources allowing consistent interaction with the set of consistent virtual resources independent of variation in the set of available resources and independent of whether a resource within the set of available resources is located at the secure element, at the host device, or both; and
the associated host device including a link module executable by a processor, the link module of the associated host device cooperating with the secure element to make a first resource available to the secure element.
1 Assignment
0 Petitions
Accused Products
Abstract
The disclosure includes a system and method in which one or more virtual resources are presented to a secure element; and the one or more virtual resources are mapped to available resources based on a model architecture for the secure element in order to provide hardware abstraction, the available physical resources varying based on the model architecture and an associated host device, the virtual resources allowing consistent interaction with the virtual resources regardless of variation in the physical resources available and their location. The hardware abstraction increases the versatility of the secure element and may contribute to the secure element'"'"'s functionality. The secure element providing functionality to replace most items carried in an individual'"'"'s pockets, e.g., logical and physical keys, a thumb drive, identification, credit and debit cards, etc.
-
Citations
20 Claims
-
1. A system comprising:
-
a secure element configured to wirelessly communicate with an associated host device, the secure element including a set of consistent virtual resources used to map a set of available resources based on a model architecture, the set of available resources variable based on one or more of the model architecture and resources associated with a host device, the set of consistent virtual resources allowing consistent interaction with the set of consistent virtual resources independent of variation in the set of available resources and independent of whether a resource within the set of available resources is located at the secure element, at the host device, or both; and the associated host device including a link module executable by a processor, the link module of the associated host device cooperating with the secure element to make a first resource available to the secure element. - View Dependent Claims (2, 3)
-
-
4. A method comprising:
-
presenting, to a secure element, a set of consistent virtual resources; and mapping the set of consistent virtual resources to a set of available resources based on a model architecture, the set of available resources variable based on one or more of the model architecture and resources associated with a host device, the set of consistent virtual resources allowing consistent interaction with the set of consistent virtual resources independent of variation in the set of available resources and independent of whether a resource within the available resources is located at the secure element, at the host device, or both. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification