System and method for secure transaction process via mobile device
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06Q-020/32
G07F-007/10
G06F-021/35
G06Q-020/38
출원번호
US-0240395
(2012-08-26)
등록번호
US-9886688
(2018-02-06)
국제출원번호
PCT/IL2012/050328
(2012-08-26)
§371/§102 date
20140223
(20140223)
국제공개번호
WO2013/030832
(2013-03-07)
발명자
/ 주소
Weiner, Avish Jacob
Ne'man, Ran
Ben-Shemen, Shmuel
출원인 / 주소
Ping Identity Corporation
인용정보
피인용 횟수 :
1인용 특허 :
36
초록▼
A secure element with a user security domain thereon, the user security domain constituted of: a security domain control circuitry; an encoder/decoder functionality responsive to the security domain control circuitry; and a secured keys storage in communication with the security domain control circu
A secure element with a user security domain thereon, the user security domain constituted of: a security domain control circuitry; an encoder/decoder functionality responsive to the security domain control circuitry; and a secured keys storage in communication with the security domain control circuitry, the encoder/decoder functionality arranged to: encode data responsive to at least one first key stored on the secured keys storage, and output an encoded data; and decode received data responsive to at least one second key stored on the secured keys storage, and output a decoded data.
대표청구항▼
1. An electronic user device enabling secure user authentication, the electronic user device comprising: a user device processor, a user device memory, a security control, and a secure element,the security control storing an encryption key and security control instructions, the security control inst
1. An electronic user device enabling secure user authentication, the electronic user device comprising: a user device processor, a user device memory, a security control, and a secure element,the security control storing an encryption key and security control instructions, the security control instructions when executed by the security control cause the security control to receive output of a peripheral device and operate in a secure mode to: produce an encrypted output of the peripheral device by encrypting the output of the peripheral device based on the encryption key; andtransmit the encrypted output of the peripheral device to the user device processor,the user device memory storing user device processor instructions, the user device processor instructions when executed by the user device processor cause the user device processor to transfer the encrypted output of the peripheral device to the secure element,the secure element storing a decryption key corresponding to the encryption key, the secure element further storing secure element instructions, the secure element instructions when executed by the secure element cause the secure element to: decrypt the encrypted output of the peripheral device based on the decryption key to thereby obtain the output of the peripheral;validate the output of the peripheral device; andsend to the user device processor data representing validation of the output of the peripheral device. 2. The electronic user device of claim 1, wherein the peripheral device is a fingerprint reader. 3. The electronic user device of claim 1, wherein the peripheral device includes at least one of: a keypad; a secure keypad; a virtual keypad; a camera; a near field communications (NFC) device; a modem; a fingerprint reader; or a voice recorder. 4. The electronic user device of claim 1, wherein the secure mode is a first mode, the security control instructions when executed cause the security control to transmit the output of the peripheral device in an unencrypted form to the user device processor responsive to the security control being in a second mode and not the first mode. 5. The electronic user device of claim 4, wherein the user device processor instructions when executed by the user device processor cause the user device processor to set the security control to operate in the first mode or the second mode. 6. The electronic user device of claim 4, wherein the secure element instructions when executed by the secure element cause the secure element to set the security control to operate in the first mode or the second mode. 7. The electronic user device of claim 4, further comprising an indicator that indicates that the security control is operating in the first mode in response to the security control is operating in the first mode. 8. The electronic user device of claim 1, wherein the secure element further stores validation information, the secure element instructions when executed by the secure element cause the secure element to validate the output of the peripheral device based on the validation information. 9. The electronic user device of claim 1, wherein the secure element, security control, user device processor, and user device memory are within a mobile communication device. 10. The electronic user device of claim 1, wherein the decryption key is inaccessible by the user device processor. 11. A method for enabling secure user authentication, comprising: at a security control and in response to when the security control is operating in a secure mode: receiving output of a peripheral device;producing an encrypted output of the peripheral device by encrypting the output of the peripheral device based on an encryption key; andtransmitting the encrypted output of the peripheral device to a user device processor in communication with the security control;at a secure element: receiving from the user device processor the encrypted output of the peripheral device;obtaining the output of the peripheral device by decrypting the encrypted output of the peripheral device based on a decryption key stored at the secure element, the decryption key corresponding to the encryption key;validating the output of the peripheral device; andsending to the user device processor data representing validation of the output of the peripheral device. 12. The method of claim 11, wherein the secure mode is a first mode, the method further comprising, at the security control and responsive to the security control operating in a second mode, transmitting the output of the peripheral device to the user device processor in an unencrypted form. 13. The method of claim 12, further comprising, at the user device processor, setting the security control to operate in the first mode or the second mode. 14. The method of claim 12, further comprising, at the secure element, setting the security control to operate in the first mode or the second mode. 15. The method of claim 12, further comprising indicating, at the secure element, that the security control is operating in the first mode in response to the security control operating in the first mode. 16. The method of claim 11, wherein: the validating the output of the peripheral device at the secure element includes validating the output of the peripheral device based on validation information stored at a memory of the secure element. 17. The method of claim 11, wherein the decryption key is inaccessible by the user device processor. 18. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to: receive, at a secure element, encrypted data from a security control via a user device processor in response to the security control receiving an output from a peripheral device and producing the encrypted data based on an encryption key;obtain the output of the peripheral device by decrypting the encrypted data based on a decryption key stored at the secure element and corresponding to the encryption key;validate the obtained output of the peripheral device; andsend to the user device processor data representing validation of the output of the peripheral device. 19. The non-transitory processor-readable medium of claim 18, wherein the decryption key is inaccessible by the user device processor.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (36)
Vasudevan, Barathram, Access techniques using a mobile communication device.
Swartz, Jerome; Goldman, Ron; Roslak, Thomas; Serbin, Gary; Barkume, Anthony R.; Stern, Miklos; White, Jay P., Cellular telephone for acquiring data encoded in bar code indicia.
Begum Paul G. (2608 Nottingham Way Salt Lake City UT 84108) Geiger Mark A. (871 Canyon Ridge Way #31 Midvale UT 84047), Instant electronic coupon verification system.
Grandcolas,Michael L.; Law,France; Doshi,Ashwin; Williams,Michael; Jang,Yeona; Merschen,Toni; Pan,Jack, Method and system for single sign-on user access to multiple web servers.
Leslie D. Owens ; Mark S. Plecity ; Alvah B. Davis ; David T. Kiswani ; I-Hsiang Yu, Method and system for validating subscriber identities in a communications network.
Challa,Nagesh; Gobburu,Venkata T., System, method, and apparatus for communicating information between a mobile communications device and a bar code scanner.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.