Abstract:
Techniques for managing data communications are provided. A method according to these techniques includes establishing a secure communication session between a client device and a server over a network, the secure communication session comprising one or more communication subsessions in which data is exchanged between the client device and the server. Establishing the secure communication session include providing an access token to the server, the access token comprising information for securely binding the one or more communication subsessions to the secure communication session, and providing attestation information to the server, the attestation information attesting to security of management of the access token by the client device.
Abstract:
Disclosed is a system and method that provides a merchant associated with a point of sale (POS) system and a consumer associated with a portable computing device (PCD) to complete a purchase transaction without transmitting or presenting confidential payment credentials. In an exemplary embodiment, sound is used to transmit data between the POS and the PCD. A payment request is rendered on the PCD. The consumer reviews and authorizes via a unique cryptographic signature. The merchant approves via addition of its unique cryptographic signature. A remote service in communication with the POS verifies the signatures via previously registered public keys. The transaction is then settled to a consumer account. Confirmation is returned to the POS and PCD. Advantageously, the transaction is commenced and completed without the PCD being online. Further, the consumer payment credentials are not stored on the PCD or transmitted from the PCD to the merchant POS system.
Abstract:
A mobile device may include a plurality of sensors and a processor. The processor may be configured to determine trust data for an asset based upon inputs from the plurality of sensors, determine whether an asset is accessible or not accessible based upon evaluating the trust data with a trust determination algorithm, and continuously update the trust data to continue to allow access to the asset or revoke access to the asset based upon the inputs from the plurality of sensors.