System and method for secure device connection

一种通信装置、访问装置的技术,应用在安全装置、安全通信装置、计算机安全装置等方向,能够解决维护用户隐私等问题

Pending Publication Date: 2020-11-17
VISA INT SERVICE ASSOC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

User privacy also needs to be maintained

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for secure device connection
  • System and method for secure device connection
  • System and method for secure device connection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Portable communication devices (eg, mobile phones, wearable devices, IoT devices) may communicate using medium-range communication protocols such as Bluetooth and WiFi. New access devices (eg, smart POS devices, mobile POS devices) can also communicate using medium-range communication protocols. A portable communication device may interact with an access device using such a medium-range communication protocol.

[0027] The medium-range communication protocol has the following advantages. First, the user can use the portable communication device to transact with the access device hands-free without sliding, reaching or tapping the portable communication device against the access device. Furthermore, although OR codes have been used, they are difficult to implement in two-way communication between an access device and a portable communication device. Second, a user with a portable communication device can also perform transactions without being physically in close proxi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method is disclosed. The method includes generating, by a portable communication device, a first random code and transmitting the first random code to an access device. The access device receives the first random code, generates a second random code, receives a personal token from a user of the portable communication device, and hashes the first random code, the second random code, and the personal token to form a first hash output. The first hash output and the second random code are received from the access device. The first random code, a stored personal token, and the second random codeare hashed to form a second hash output. A determination is made if the first hash output and the second hash output are equal. A secure communication channel is formed between the portable communication device and the access device when the first hash output and the second hash output are equal.

Description

[0001] Related Application Cross Reference [0002] none. Background technique [0003] In many cases, multiple portable communication devices may be able to communicate with multiple terminals at a particular location to gain access to a particular resource. For example, refer to figure 1 , there may be a plurality of portable communication devices D1 , D2 , D2 and D4 that may be able to interact with a plurality of access devices T1 , T2 and T3 in location L. Each of access devices T1, T2, and T3 may be a point-of-sale terminal, kiosk, secure location entry device, or the like. Portable communication devices D1, D2, D3, and D4 may be mobile phones, wearable devices, etc. that are capable of interacting (eg, conducting payment transactions) with access devices T1, T2, and T3. Portable communication devices D1, D2, D3 and D4 may communicate with any of access devices T1, T2 and T3 using a medium-range communication protocol such as Bluetooth. However, in order to ensure th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/35
CPCG06F21/35G06F21/74H04W12/50G06F21/606H04L9/00H04L9/08H04W12/08
Inventor 陈悦玺M·科基切夫
Owner VISA INT SERVICE ASSOC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products