Abstract:
A method for a mobile device to conduct a transaction with an unattended point-of-transaction device is disclosed. The method comprises transmitting to the unattended point-of-transaction device, via near field communication (NFC), information indicating that the transaction is being initiated; receiving from the unattended point-of-transaction device, via NFC, credentials indicating that the unattended point-of-transaction device is authorized to engage in the transaction; and transmitting to the unattended point-of-transaction device, via NFC, secure information indicating to the unattended point-of-transaction device that the mobile communication device is authorized to conduct the transaction. The secure information may be a PIN entered into the mobile device or a data record specifying an action to be performed by the unattended point-of-transaction device. The data record may be generated by the mobile device based on the entry into the mobile device of the PIN and information specifying the action to be performed by the unattended point-of-transaction device.
Abstract:
Embodiments relate generally to systems and methods for providing access to a trusted security zone container within a trusted security zone of a mobile device. An application may receive trusted service manager validation data from a trusted service manager. The application may also receive a trusted security zone master key, wherein the trusted security zone master key provides access to a plurality of trusted security zone containers within the trusted security zone. The application may hash the trusted service manager validation data with the trusted security zone master key. The application may generate the trusted security zone sub key based on hashing to access one or more containers. One or more signal may be transmitted to provision the set of one or more trusted security zone containers with the trusted security zone sub key. The application may provide the sub key to the trusted service manager to access a container.