Method and system for trusted notifications

    公开(公告)号:US11146539B2

    公开(公告)日:2021-10-12

    申请号:US16228238

    申请日:2018-12-20

    Abstract: A method for trusted notifications comprises: receiving, at a first host having at least one trusted server, a request message from a sender computing device, the request message comprising a request identifier and instructions to: update, at a second host, a recipient account associated with a recipient computing device, and to make a corresponding update at the first host to a sender account associated with the sender computing device. The method further comprises authorizing, at the first host, the request message; updating the sender account; generating a secure message at the at least one trusted server, the secure message comprising the request identifier and an indication from the at least one trusted server that the update completed; and sending the secure message from the first host to the sender computing device. The secure message can be received at the sender computer device and conveyed to the recipient computing device.

    ACCESS CONTROL BYPASS ON MOBILE FOR MASS TRANSIT

    公开(公告)号:US20210295306A1

    公开(公告)日:2021-09-23

    申请号:US17341924

    申请日:2021-06-08

    Abstract: A method of operating a payment-enabled mobile device to gain access to a location or a service. In an embodiment, a contactless front-end (CLF) component of a payment-enabled mobile device sequentially detects short-distance radio signals comprising at least two different polling signals, determines based on the sequence of the at least two different polling signals, that the payment-enabled mobile device is in proximity to a non-retail contactless transaction terminal, and then a payment application running on the payment-enabled mobile device bypasses a customary user verification feature. The process also includes the payment-enabled mobile device running the payment application performing a transaction with the non-retail contactless transaction terminal without invoking the customary user verification feature and then gaining access to at least one of a location or service. In some embodiments, the location or service includes one of a transit system, a hotel, a motor vehicle, a workplace, a room, a home, a bank branch, a vehicle charging station and a government facility.

    Apparatus, method, and computer program product for recovering torn smart payment device transactions

    公开(公告)号:US10181121B2

    公开(公告)日:2019-01-15

    申请号:US13754419

    申请日:2013-01-30

    Abstract: A first command is sent from a payment terminal assembly to a payment device with an on-device balance to compute a cryptogram to complete a putative transaction. It is detected that the cryptogram is not received as expected. In response, an identifier of the payment device and transaction recovery data associated with the putative transaction are stored in a storage area of a terminal memory of the payment terminal assembly. The payment terminal assembly obtains the identifier of the payment device, upon re-presentation of the payment device. Upon such re-presentation, the payment terminal assembly compares the obtained identifier of the payment device to contents of the storage area. Conditioned at least upon the comparing yielding a match, a second command is sent from the payment terminal assembly to the payment device to instruct the payment device to re-produce the cryptogram to complete the putative transaction.

    Method and system for trusted notifications

    公开(公告)号:US11855969B2

    公开(公告)日:2023-12-26

    申请号:US17494077

    申请日:2021-10-05

    Abstract: A method for trusted notifications comprises: receiving, at a first host having at least one trusted server, a request message from a sender computing device, the request message comprising a request identifier and instructions to: update, at a second host, a recipient account associated with a recipient computing device, and to make a corresponding update at the first host to a sender account associated with the sender computing device. The method further comprises authorizing, at the first host, the request message; updating the sender account; generating a secure message at the at least one trusted server, the secure message comprising the request identifier and an indication from the at least one trusted server that the update completed; and sending the secure message from the first host to the sender computing device. The secure message can be received at the sender computer device and conveyed to the recipient computing device.

    ACCESS CONTROL BYPASS ON MOBILE FOR MASS TRANSIT

    公开(公告)号:US20230342751A1

    公开(公告)日:2023-10-26

    申请号:US18347049

    申请日:2023-07-05

    Abstract: A contactless transaction terminal and method for interacting with a payment enabled mobile device to permit access to a location or to a service. The contactless transaction terminal includes a processor, a polling signal generator operably connected to the processor, an NFC circuit operably connected to the polling signal generator, and a receiver operably connected to the NFC circuit and to a data recovery circuit that is operably connected to the processor. Also included is a storage device operably connected to the processor. The storage device stores program instructions which when executed cause the processor to generate, via the polling signal generator, short-distance radio signals including at least three polling signals; emit, via the NFC circuit, the at least three polling signals at frequent intervals for detection by a payment-enabled mobile device; receive at least one of a Type A or Type B signal from the payment enabled mobile device; and permit access to at least one of a location or service.

    Secure Channel Establishment
    7.
    发明申请

    公开(公告)号:US20240380577A1

    公开(公告)日:2024-11-14

    申请号:US18559848

    申请日:2022-04-25

    Abstract: There is provided a computer-implemented method for establishing a communication channel for exchanging messages securely between an initiator device and an endpoint device using an intermediary server. The initiator device is in communication with the intermediary server via a first session encrypted according to a cryptographic protocol. The endpoint device is in communication with the intermediary server via a second session encrypted according to a cryptographic protocol. A request for a handover token via the first session is sent to intermediary server. The handover token includes data that has been generated at the endpoint device and is configured to be used in setting up the communication channel between the initiator device and the endpoint device. The handover token is received from the intermediary server via the first session encrypted according to a cryptographic protocol. The communication channel is established between the initiator device and the endpoint device.

    Secure channel establishment between payment device and terminal device

    公开(公告)号:US10461927B2

    公开(公告)日:2019-10-29

    申请号:US15642762

    申请日:2017-07-06

    Abstract: A method of establishing a secure channel for communication between a first computing device and a second computing device is described. The method uses an elliptic curve Diffie-Hellman protocol, wherein G is an elliptic curve generator point and the first computing device has a unique private key dc with a public key Qc=dc G certified by a party trusted by the second computing device. The first computing device generates (520) a blinding factor r and sends (540) a blinded public key R=r·Qc to the second computing device. The second computing device generates (510) an ephemeral private key dt and a corresponding ephemeral public key Qt=dt G and sends Qt to the first computing device. The first computing device generates (530) Kc=KDF(r dc·Qt) and the second computing device generates (550) Kt=KDF(dt·R), where KDF is a key derivation function used in both generation operations, to establish a secure channel between the first computing device and the second computing device. G is a point in the elliptic curve group E, wherein E is a group of prime order but E* is the quadratic twist of E and is a group of order m=z·m′ where m′ is prime and z is an integer, wherein r·dc is chosen such that z is a factor of r·dc. Suitable apparatus for performing the method is also described.

    SECURE CHANNEL ESTABLISHMENT
    10.
    发明申请

    公开(公告)号:US20180026784A1

    公开(公告)日:2018-01-25

    申请号:US15642762

    申请日:2017-07-06

    Abstract: A method of establishing a secure channel for communication between a first computing device and a second computing device is described. The method uses an elliptic curve Diffie-Hellman protocol, wherein G is an elliptic curve generator point and the first computing device has a unique private key dc with a public key Qc=dc G certified by a party trusted by the second computing device. The first computing device generates (520) a blinding factor r and sends (540) a blinded public key R=r·Qc to the second computing device. The second computing device generates (510) an ephemeral private key dt and a corresponding ephemeral public key Qt=dt G and sends Qt to the first computing device. The first computing device generates (530) Kc=KDF (r dc·Qt) and the second computing device generates (550) Kt=KDF (dt·R), where KDF is a key derivation function used in both generation operations, to establish a secure channel between the first computing device and the second computing device. G is a point in the elliptic curve group E, wherein E is a group of prime order but E* is the quadratic twist of E and is a group of order m=z·m′ where m′ is prime and z is an integer, wherein r·dc is chosen such that z is a factor of r·dc. Suitable apparatus for performing the method is also described.

Patent Agency Ranking