This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
User privacy also needs to be maintained
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0026] Portable communication devices (eg, mobile phones, wearable devices, IoT devices) may communicate using medium-range communication protocols such as Bluetooth and WiFi. New access devices (eg, smart POS devices, mobile POS devices) can also communicate using medium-range communication protocols. A portable communication device may interact with an access device using such a medium-range communication protocol.
[0027] The medium-range communication protocol has the following advantages. First, the user can use the portable communication device to transact with the access device hands-free without sliding, reaching or tapping the portable communication device against the access device. Furthermore, although OR codes have been used, they are difficult to implement in two-way communication between an access device and a portable communication device. Second, a user with a portable communication device can also perform transactions without being physically in close proxi...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
A method is disclosed. The method includes generating, by a portable communication device, a first random code and transmitting the first random code to an access device. The access device receives the first random code, generates a second random code, receives a personal token from a user of the portable communication device, and hashes the first random code, the second random code, and the personal token to form a first hash output. The first hash output and the second random code are received from the access device. The first random code, a stored personal token, and the second random codeare hashed to form a second hash output. A determination is made if the first hash output and the second hash output are equal. A secure communication channel is formed between the portable communication device and the access device when the first hash output and the second hash output are equal.
Description
[0001] Related Application Cross Reference [0002] none. Background technique [0003] In many cases, multiple portable communication devices may be able to communicate with multiple terminals at a particular location to gain access to a particular resource. For example, refer to figure 1 , there may be a plurality of portable communication devices D1 , D2 , D2 and D4 that may be able to interact with a plurality of access devices T1 , T2 and T3 in location L. Each of access devices T1, T2, and T3 may be a point-of-sale terminal, kiosk, secure location entry device, or the like. Portable communication devices D1, D2, D3, and D4 may be mobile phones, wearable devices, etc. that are capable of interacting (eg, conducting payment transactions) with access devices T1, T2, and T3. Portable communication devices D1, D2, D3 and D4 may communicate with any of access devices T1, T2 and T3 using a medium-range communication protocol such as Bluetooth. However, in order to ensure th...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.