摘要:
A mobile device as disclosed herein can support a plurality of electronic payment applications such as credit and/or debit applications. During a payment transaction, the mobile device communicates a priority list of the electronic payment applications to a point of sale terminal, which then selects one of the applications for completion of the payment transaction, where the selection is governed by the priority list. The data structure corresponding to the priority list is configured such that the end user of the mobile device has management access rights to at least some of the electronic payment applications. Such end user management access rights can be used to modify the relative priority of the electronic payment applications.
摘要:
A mobile device as disclosed herein can support a plurality of electronic payment applications such as credit and/or debit applications. During a payment transaction, the mobile device communicates a priority list of the electronic payment applications to a point of sale terminal, which then selects one of the applications for completion of the payment transaction, where the selection is governed by the priority list. The data structure corresponding to the priority list is configured such that the end user of the mobile device has management access rights to at least some of the electronic payment applications. Such end user management access rights can be used to modify the relative priority of the electronic payment applications.
摘要:
A password is securely distributed to a client device of a network by sending a first encrypted message from the client device to a server of the network, the first message comprising a nonce created by the client device, a username of the client device, and a network address of the client device, then sending a second message from the server to the network address of the client device, the second message comprising the nonce created by the client device, and a password created by the server. If the client device verifies that the nonce received from the server matches the nonce sent to the server, the password and username may be used to enable to client device to access information on the server. The first encrypted message may be an HTTPS message and the second message may be an SMS message.
摘要:
A method and apparatus for modifying the Multimedia Internet KEYing (MIKEY) protocol to support an extended key-management message (KMM), wherein the apparatus programs a computer to perform the method, which includes: determining that a KMM is directed to a target device; determining that the KMM is an extended KMM related to a key-management operation that is not supported by the standard MIKEY protocol; signaling the extended KMM in at least one field of a MIKEY message; and sending the MIKEY message to the target device.
摘要:
Methods, systems and apparatus are provided for source authentication. In accordance with the disclosed embodiments, a key-management server generates a key-delivery message that includes a key data transport payload secured with a group key, and a source authentication payload. Upon receiving the key-delivery message at a communication device, the communication device may verify whether the source authentication payload of the key-delivery message is valid. When the source authentication payload is determined to be valid, the communication device thereby authenticates that the key-delivery message was transmitted by the key-management server.
摘要:
Disclosed are a system and method for aggregating micropayment hash chains. An end user (the “payer”) cryptographically signs “commitments” and transmits then to a vendor. The commitments include an “accumulated count” field which tracks the total number of micropayments made thus far in the payment transaction between the payer and the vendor. The payer can also transmit payment tokens to the vendor. These payment tokens include micropayments verified by a hash chain. When the vendor seeks reimbursement from a broker, the vendor tells the broker the total number of micropayments in the payment transaction and sends verification information to the broker. The broker checks this information against a verification system established with the payer. If the information is verified to be correct, then the broker reimburses the vendor for the services provided and charges the payer. The verification information ensures that the payer and vendor cannot cheat each other.
摘要:
A key message can include a key-encryption-key (KEK) associated with a KeyDomainID and a KeyGroupID. A session description message can describe streaming media initialization parameters containing media stream information for one or more media streams. For each media stream, the media stream information can include an IP address and a data port. The session description message can further contain a linkage for binding the KEK to a corresponding one of the media streams. The linkage can include the KeyDomainID and KeyGroupID or can include an abstract representation of the KeyDomainID and KeyGroupID. During session initialization, the key-encryption-key (KEK) can be bound to the media streams using the linkage of the session description message. Each of the media streams can be secured using a traffic key conveyed to user equipment (UE) under protection of the key-encryption-key (KEK).
摘要:
A means for determining a channel for communication in a wireless communication system is provided. A method includes receiving one or more sub-frames of a beacon signal on a beaconing channel until a legitimacy condition of the beacon signal is met. The beacon signal is transmitted by a beaconing device. The method further includes determining a suitability of the channel for communication in the wireless communication system based on the legitimacy condition.
摘要:
Simultaneously detecting both frame and bit synchronization in a serial bit stream reduces the time required to have a receiver lock up to a transmitted serial data signal. A dual-phase correlator circuit is used to detect frame synchronization while a multiphase commutator circuit detects bit clock synchronization.
摘要:
A device (110) performs a method 200 for authentication and Ad Hoc network setup. The device (110) receives (210) a first security configuration; receives (220) a second security configuration based on location; authenticates (230) at least a second node (110) having the first security configuration and the second security configuration; and forms (240) a network with the at least a second node (110).