1
RIEDL JOSEF: CARTE DE SUPPORT DE DONNEES ET PROCEDE DE FABRICATION CONNEXE, DATA CARRIER CARD AND METHOD FOR PRODUCING A DATA CARRIER CARD. GIESECKE & DEVRIENT, GIESECKE DEVRIENT MOBILE SECURITY, RIDOUT & MAYBEE, March 6, 2018: CA2728468 (2 worldwide citation)

The invention relates to a data carrier card and to a method for producing a data carrier card, in particular a chip card or magnetic stripe card. The data carrier card according to the invention comprises a card body (1, 101, 201, 301, 401) comprising one or several foils, whereby the foil (2) or a ...


2
Ullrich Martini: Method and end device for securely inputting access code. GIESECKE DEVRIENT MOBILE SECURITY, Workman Nydegger, October 17, 2017: US09792445 (1 worldwide citation)

The invention provides a method for securely inputting an access code to an input interface of a mobile end device. During an input time period covering the process of inputting the access code, at least one or some sensors of the end device that are uninvolved in the input of the access code, said ...


3
STUIS HERMANN: METHODE ET APPAREILLAGE DE PERSONNALISATION DE CARTES, METHOD AND APPARATUS FOR PERSONALIZING CARDS. GIESECKE & DEVRIENT, GIESECKE DEVRIENT MOBILE SECURITY, RIDOUT & MAYBEE, January 29, 2019: CA2651355 (1 worldwide citation)

In a card personalization machine ( 10) with a plurality of production stages (30, 40, 50, 70), cards (100), e.g. chip cards, ID cards, etc, are individually personalized in dependence on a total set of possible processing parameters, individual ones of the processing parameters being variable witho ...


4
Florian Gawlas, Jan Eichholz: Method for authorizing a transaction. GIESECKE DEVRIENT MOBILE SECURITY, Justin J Cassell, Workman Nydegger, August 14, 2018: US10050790

A method for authorizing a transaction has the following steps: inputting transaction data on a first mobile device, transmitting the transaction data from the first device to a background system by means of a first over-the-air interface, transmitting in encrypted manner at least a password to a se ...


5
Frank Schafer, Daniel Albert, Claus Dietze, Johannes Luyken, Ralf Schedel, Helmut Schuster: Method for installing security-relevant applications in a security element of a terminal. GIESECKE DEVRIENT MOBILE SECURITY, Workman Nydegger, July 17, 2018: US10025575

A method is provided for installing a security-relevant portion of an application made available by an application provider in a security element of a terminal. The terminal requests the application from the application provider and receives the application. Subsequently, the received security-relev ...


6
Josef Riedl, Cordula Regensburger, Andreas Braun: Coextruded foil composite material and its use in card bodies. GIESECKE DEVRIENT MOBILE SECURITY, Workman Nydegger, October 24, 2017: US09796122

A composite film material usable in a data carrier card body includes a first outer plastic layer, an inner plastic layer and a second outer plastic layer, all the layers together forming a co-extruded composite. The plastic material of the first outer layer is a polyethylene terephthalate glycol co ...


7
Hans Graf, Eike Thomas Bode, Werner Strobl: Data support with tan-generator and display. GIESECKE DEVRIENT MOBILE SECURITY, Workman Nydegger, October 2, 2018: US10089621

The invention creates a data carrier, in particular chip card, in particular smart card, having a device for generating one-time passwords and having a display for displaying generated one-time passwords. Preferably the data carrier is a Eurocheque card or credit card with the integrated function of ...


8
Walter Ponikwar, Thomas Tarantino, Tobias Salzer, Andreas Braun, Gunter Endres: Method for producing a data carrier that prevents mechanical strains between chip and data carrier body. GIESECKE DEVRIENT MOBILE SECURITY, Workman Nydegger, January 8, 2019: US10176421

This disclosure includes a method for manufacturing a portable data carrier, an inlay for a data carrier, and a data carrier. A data carrier body has a gap for a chip and a chip is incorporated into the gap. In a subsequent step a cover layer is laid on the data carrier body, and the data carrier bo ...


9
Michael Ruhland Bauer, Harald Reiner, Thanh Hao Huynh, Karlheinz Mayer: Reliefed card-shaped data carrier. GIESECKE DEVRIENT MOBILE SECURITY, Workman Nydegger, November 21, 2017: US09821593

A multilayer card-shaped data carrier has a core layer based on paper, with an individualization formed in the layer. At least a part of the area of the data carrier is deformed into a relief which has a viewing angle-dependent optical effect and which extends into the core layer through the cover l ...


10
Jan Eichholz, Gisela Meister, Thomas Aichberger: Method for reading an identification document in a contactless manner. GIESECKE DEVRIENT MOBILE SECURITY, Justin J Cassell, Workman Nydegger, August 14, 2018: US10050788

The invention creates a method for the contactless readout of an electronic identification document by means of a terminal, wherein in a data reading step encrypted identification data from a data memory are transmitted to the terminal, and in a key reading step the data key with which the identific ...