Abstract:
An envoy device configured to perform a transaction with a further device. The envoy device comprises: a data store; a processor; communication circuitry for communicating with the further device; and a display. The envoy device is configured to respond to detection of the further device being within a predetermined physical proximity to trigger initiation of a transaction between the devices; and to respond to the transaction completing to display an object related to the transaction that it is determined the user may wish to select to initiate a subsequent action.
Abstract:
A trusted device, such as a wristwatch, is provided with authentication circuitry, used to perform an authentication operation to switch the trusted device into an authenticated state. Retention monitoring circuitry monitors the physical possession of the trusted device by the user following the authentication operation and switches the trusted device out of an authenticated state if the trusted device does not remain in the physical possession of the user. While the trusted device remains in the physical possession of the user, communication triggering circuitry is used to detect a request to establish communication with a target device that is one of a plurality of different target devices and communication circuitry is used to communicate with that target device using an authenticated identity of the user.
Abstract:
An apparatus, system and method for establishing a transaction between first and second parties including a first signing step in which a transaction message including a request and a transaction identifier is cryptographically signed by the first party to form a first cryptographically signed message. The first signed message is transmitted from the first party to the second party. The second party then cryptographically signs the first message to form a second cryptographically signed message. The second message is also transmitted from one or more of a plurality of parties having the second message to a trusted third party. The trusted third party is able to verify that the second message was cryptographically signed by the second party and can also verify that the first message in the second message was cryptographically signed by the first party.
Abstract:
An envoy device for performing transactions with a further device in proximity to the envoy device, the envoy device comprising: a first communication device configured to communicate with the further device that is located within a predetermined distance of the envoy device using a local short range communication link; at least one further communication device configured to communicate with the further device using at least one longer range communication link. The envoy device is configured to respond to detecting the further device within the predetermined distance of the envoy device to: establish communication with the further device using the local short range communication link; receive information from the further device regarding any further communication links that the further device has access to; transmit to the further device information regarding the at least one longer range communication link; and to commence a transaction with the further device using the local short range communication link.
Abstract:
An envoy device configured to perform a transaction with a further device. The envoy device comprises: a data store; a processor; communication circuitry for communicating with the further device; and a display. The envoy device is configured to respond to detection of the further device being within a predetermined physical proximity to trigger initiation of a transaction between the devices; and to respond to the transaction completing to display an object related to the transaction that it is determined the user may wish to select to initiate a subsequent action.
Abstract:
An envoy device for performing transactions with a further device in proximity to said envoy device, said envoy device comprising a data store, a processor; a first communication device configured to communicate with said further device that is located close enough to said envoy device to establish a first communication link; and at least one further communication device configured to communicate with said further device using at least one further communication link; said envoy device being configured to respond to detecting said further device close enough to said envoy device to establish said first communication link to: establish communication with said further device using said first communication link; receive information from said further device regarding said at least one further communication link that said further device is capable of communicating via and communicating at least one access key for connecting said further device and said first envoy device via said at least one further communication link; and commence a transaction with said further device using said first communication link.
Abstract:
An envoy device for performing transactions with a further device in proximity to the envoy device, the envoy device comprising: a first communication device configured to communicate with the further device that is located within a predetermined distance of the envoy device using a local short range communication link; at least one further communication device configured to communicate with the further device using at least one longer range communication link. The envoy device is configured to respond to detecting the further device within the predetermined distance of the envoy device to: establish communication with the further device using the local short range communication link; receive information from the further device regarding any further communication links that the further device has access to; transmit to the further device information regarding the at least one longer range communication link; and to commence a transaction with the further device using the local short range communication link.
Abstract:
Techniques for controlling the provision of data to a requester use a local device communicating with a personal computing device. The personal computing device has an authorized state and an unauthorized state. If the personal computing device is proximal to the local device when the local device receives the request for data from the requester, then the personal computing device uses permission data it stores to determine whether the request is or is not a permitted request. If the request is a permitted request, then the personal computing device sends a message to a token issuing device to issue a token request to the requester. The requester then uses this token to access a third party device holding the data to which it seeks access.
Abstract:
A trusted device, such as a wristwatch, is provided with authentication circuitry, used to perform an authentication operation to switch the trusted device into an authenticated state. Retention monitoring circuitry monitors the physical possession of the trusted device by the user following the authentication operation and switches the trusted device out of an authenticated state if the trusted device does not remain in the physical possession of the user. While the trusted device remains in the physical possession of the user, communication triggering circuitry is used to detect a request to establish communication with a target device that is one of a plurality of different target devices and communication circuitry is used to communicate with that target device using an authenticated identity of the user.
Abstract:
Techniques for controlling the provision of data to a requester use a local device communicating with a personal computing device. The personal computing device has an authorized state and an unauthorized state. If the personal computing device is proximal to the local device when the local device receives the request for data from the requester, then the personal computing device uses permission data it stores to determine whether the request is or is not a permitted request. If the request is a permitted request, then the personal computing device sends a message to a token issuing device to issue a token request to the requester. The requester then uses this token to access a third party device holding the data to which it seeks access.