Abstract:
In some examples, a system and method for generating a payment instrument are described. The method includes receiving a unique signature that a recipient intends to associate with the payment instrument; verifying that the received feature meets an acceptability criterion; generating a representation of the received signature, wherein the representation is in a form capable of being physically associated with the payment instrument, and wherein association is established by embedding or exposing the representation on the payment instrument; and causing physical generation of the payment instrument having associated therewith the representation of the signature.
Abstract:
Systems, methods, and devices for concealed chip-card readers are disclosed. In one embodiment, a chip-enabled card reader may include a card slot that receives a chip-enabled card; a carriage comprising a smart chip connector for contacting a chip on the chip-enabled card; and at least one carriage track disposed within the chassis that slideably engages the carriage and defines a path of movement for the carriage between a protected position and a reading position. The carriage may move along the path of movement to a reading position. The smart chip connector may contact the chip on the chip-enabled card when the chip-enabled card is in a fully-inserted position. The carriage is in the protected position when no card has been inserted into the card slot. In one embodiment, the smart chip connector has reduced accessibility through the opening.
Abstract:
A portable data carrier, in particular a chip card, comprises one or several sensors which are respectively arranged for detecting via the capture of measurement values a laying open of a surface of the portable data carrier as a detection event. It further comprises one or several output means for outputting signals perceptible by a user. The data carrier according to the invention is wherein it is arranged for outputting a signal via the one or more output means upon satisfaction of a detection criterion, the detection criterion being satisfied when the detection event is detected by at least a part of the sensors.
Abstract:
An MR sensor structured to detect whether or not magnetic data are recorded in a magnetic stripe of a card having first and second tracks may include a first resistor and a second resistor serially-connected with each other and disposed at positions where the first track is passed; and a third resistor and a fourth resistor serially-connected with each other and disposed at positions where the second track is passed. The second resistor and the fourth resistor may be connected with a power supply, and the first resistor and the third resistor may be ground grounded. A potential difference between a first midpoint between the first resistor and the second resistor and a second midpoint between the third resistor and the fourth resistor may be an output of the MR sensor.
Abstract:
Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electrical power, or some other property of the target device, that varies during the device's processing. As the target device performs cryptographic operations, data from the A/D converter are recorded for each cryptographic operation. The stored data are then processed using statistical analysis, yielding the entire key, or partial information about the key that can be used to accelerate a brute force search or other attack.
Abstract:
A time manager controls one or more timing functions on a circuit. The time manager includes a data storage and a time calculator. The data storage device stores a first indication of a performance characteristic of a memory cell at a first time. The data storage device also stores a second indication of the performance characteristic of the memory cell at a second time. The time calculator is coupled to the data storage device. The time calculator calculates a time duration between the first time and the second time based on a change in the performance characteristic of the memory cell from the first indication to the second indication.
Abstract:
A device to secure an object receives a digital file representing a photograph as an input. The photogram represents at least one portion of the object. An encoder of the device encodes characteristic elements of the photograph into a matrix code. The device further includes a printer to print the matrix code on or in the object. The photograph can represent biometric data of a person, which are also visible on the object. An image sensor can be used to input the digital file representing the photograph and is configured to take an image of the object on which the matrix code is printed.
Abstract:
A portable data carrier (1) includes a non-volatile memory (11), a processor (15) and a watermark application (131) executable by the processor (15) which is also stored on the data carrier (1). The watermark application (131) is configured to check (152) data (110, 140) stored on the data carrier (1) or data intended to be stored on the data carrier (1) as to the presence of a digital watermark, or to mark (151) such data (110, 140) with a digital watermark. The check (152) or marking (151) is carried out on the data carrier (1) and after the check (152) or marking (151) the checked or marked data (110, 140) are stored in the non-volatile memory (11) in order to remain there for an indefinite time.
Abstract:
Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electrical power, or some other property of the target device, that varies during the device's processing. As the target device performs cryptographic operations, data from the A/D converter are recorded for each cryptographic operation. The stored data are then processed using statistical analysis, yielding the entire key, or partial information about the key that can be used to accelerate a brute force search or other attack.
Abstract:
A device (200; 300) comprising a first application unit (401) and a second application unit (402) provided in a first portion (202) of the device (200; 300), and a transfer unit (211) provided in a second portion (212; 302) of the device (200; 300), wherein the transfer unit (211) is adapted to transmit a message between the first application unit (401) and the second application unit (402), and wherein a higher level of security is provided in the first portion (202) than in the second portion (212; 302) and/or wherein the transfer unit (211) is adapted to take the role of a communication master when transmitting the message between the first application unit (401) and the second application unit (402).