摘要:
Embodiments of the invention provide systems and methods for identifying devices by a trusted service manager. According to one example embodiment of the invention, a method for identifying communications is provided. The method can include receiving, by a service provider from a device, a message comprising card production life cycle (CPLC) information associated with a secure element incorporated into the device; and evaluating, by the service provider, the received CPLC information in order to identify the secure element.
摘要:
Embodiments of the invention provide systems and methods for authenticating mobile devices. A registration request and identifying information for a mobile device or a secure element associated with the mobile device may be received. Based upon the received identifying information and a base level key, a rotated key for the mobile device may be determined. The determined rotated key may then be provided to the mobile device, and the rotated key may be utilized for subsequent authentication of the mobile device.
摘要:
Embodiments of the invention provide systems and methods for identifying devices by a trusted service manager. According to one example embodiment of the invention, a method for identifying communications is provided. The method can include receiving, by a service provider from a device, a message comprising card production life cycle (CPLC) information associated with a secure element incorporated into the device; and evaluating, by the service provider, the received CPLC information in order to identify the secure element.
摘要:
Embodiments of the invention provide systems and methods for authenticating mobile devices. A registration request and identifying information for a mobile device or a secure element associated with the mobile device may be received. Based upon the received identifying information and a base level key, a rotated key for the mobile device may be determined. The determined rotated key may then be provided to the mobile device, and the rotated key may be utilized for subsequent authentication of the mobile device.
摘要:
Embodiments of the disclosure can provide systems, methods, and apparatus for remote secure transactions. In one embodiment, a payment processing system can be provided, which can include a network interface communicating with a memory, the memory communicating with a processor for executing payments, and the processor, when executing a computer program, performing operations. The operations can include storing, by the processor and to a memory associated with the payment processing system, account information associated with the consumer mobile system, and receiving, by the processor and from a consumer mobile device, a request, wherein the request comprises an account identifier associated with the consumer mobile device. The operations can also include validating, by the processor and from a consumer mobile device, the consumer mobile device based at least in part on the account identifier, and sending, by the processor, payment processing data, based on the validation.
摘要:
Embodiments of the invention can provide systems and methods for encrypting mobile device communications. According to one example embodiment of the invention, a method for encrypting mobile device communications is provided. The method can include generating, by a first application stored on a first memory of a mobile device, a message to be communicated to an intended recipient; providing, by the first application to an authentication application stored on a second memory of the mobile device, the message; encrypting, by the authentication application, the message; providing, by the authentication application to the first application, the encrypted message; and directing, by the first application, communication of the message to the intended recipient.
摘要:
Embodiments of the invention can provide systems and methods for encrypting mobile device communications. According to one example embodiment of the invention, a method for encrypting mobile device communications is provided. The method can include generating, by a first application stored on a first memory of a mobile device, a message to be communicated to an intended recipient; providing, by the first application to an authentication application stored on a second memory of the mobile device, the message; encrypting, by the authentication application, the message; providing, by the authentication application to the first application, the encrypted message; and directing, by the first application, communication of the message to the intended recipient.
摘要:
A method and apparatus for brokering a transmission control protocol (TCP) session between two clients that are each situated behind a firewall that blocks incoming TCP session requests is described. Each of the two clients transmits a TCP session request to the other client in order to establish a TCP session between these clients. This brokering allows the two clients to establish the TCP session between the two clients.
摘要:
Methods and apparatus are disclosed for defining an optimized media path. In one exemplary method, a proxy session controller registers, for a plurality of realms, a plurality of Border Gateway Functions (BGFs) residing on a plurality of network nodes, with the registration including registering a preferred BGF colocated with a data network gateway on a single network node for a selected set of the realms. A request message is received from a user terminal, and if a realm associated with the request message is included in the selected set of realms, the controller assigns the preferred BGF to the user terminal to provide an optimized media path that includes the user terminal, the preferred BGF, and the data network gateway.
摘要:
Embodiments of the invention can provide systems and methods for tokenizing financial information associated with mobile device transactions. According to one example embodiment of the invention, a method for providing tokens to devices can be provided. The method can include receiving, from a device, a request for a token to represent financial information; identifying, in response to the request, token information associated with the token; providing at least a portion of the token information to the device; and providing the token to a third party entity, wherein the third party entity utilizes the received token to evaluate a second token subsequently received from one of the device or a user of the device.