Device pairing via trusted intermediary
First Claim
1. A method of indirectly pairing a trusted device with an untrusted device, the method comprising:
- obtaining, by the trusted device, a pairing identifier provided by the untrusted device, wherein the untrusted device sends a pairing identifier request to an untrusted device controller, wherein the untrusted device controller sends the pairing identifier to the untrusted device and sends the pairing identifier and an untrusted device controller identifier to a trusted intermediary, and wherein the trusted intermediary stores the pairing identifier and the untrusted device controller identifier, one in association with the other, in a pairing identifier database;
sending, by the trusted device, a pairing request including the pairing identifier to an intermediary computer, wherein the intermediary computer extracts the pairing identifier from the pairing request, searches the pairing identifier database for a matching pairing identifier, and sends the pairing request to the untrusted device controller associated with the matching pairing identifier;
receiving, by the trusted device, a pairing confirmation from the intermediary computer indicating that the trusted device is indirectly paired to the untrusted device such that the trusted device can complete a transaction with the untrusted device without communicating transaction information to the untrusted device;
sending by the trusted device, a transaction request for the transaction with the untrusted device to the intermediary computer, wherein the intermediary computer sends the transaction request to the untrusted device controller; and
receiving, by the trusted device, a transaction response from the intermediary computer indicating that the transaction is completed, wherein the intermediary computer receives a response associated with the transaction request from the untrusted device controller, the transaction response based on the response from the untrusted device controller.
0 Assignments
0 Petitions
Accused Products
Abstract
Embodiments are directed at systems, apparatuses, and methods for indirect device pairing through a trusted intermediary. One embodiment is directed to a method including receiving a pairing identifier associated with an untrusted device controller. The method further comprises extracting the pairing identifier from the pairing request, searching a pairing identifier database for a matching pairing identifier, determining an untrusted device controller associated with the matching pairing identifier, and sending the pairing request to the untrusted device controller. The untrusted device controller may identify the untrusted device, associate the pairing identifier with the trusted intermediary, and lock the pairing identifier. The method further comprises receiving a pairing response indicating that the untrusted device is paired with the computer. Accordingly, the trusted device is indirectly paired to the untrusted device and the trusted device is configured to complete a transaction with the untrusted device without communicating transaction information to the untrusted device.
550 Citations
14 Claims
-
1. A method of indirectly pairing a trusted device with an untrusted device, the method comprising:
-
obtaining, by the trusted device, a pairing identifier provided by the untrusted device, wherein the untrusted device sends a pairing identifier request to an untrusted device controller, wherein the untrusted device controller sends the pairing identifier to the untrusted device and sends the pairing identifier and an untrusted device controller identifier to a trusted intermediary, and wherein the trusted intermediary stores the pairing identifier and the untrusted device controller identifier, one in association with the other, in a pairing identifier database; sending, by the trusted device, a pairing request including the pairing identifier to an intermediary computer, wherein the intermediary computer extracts the pairing identifier from the pairing request, searches the pairing identifier database for a matching pairing identifier, and sends the pairing request to the untrusted device controller associated with the matching pairing identifier; receiving, by the trusted device, a pairing confirmation from the intermediary computer indicating that the trusted device is indirectly paired to the untrusted device such that the trusted device can complete a transaction with the untrusted device without communicating transaction information to the untrusted device; sending by the trusted device, a transaction request for the transaction with the untrusted device to the intermediary computer, wherein the intermediary computer sends the transaction request to the untrusted device controller; and receiving, by the trusted device, a transaction response from the intermediary computer indicating that the transaction is completed, wherein the intermediary computer receives a response associated with the transaction request from the untrusted device controller, the transaction response based on the response from the untrusted device controller. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer comprising:
-
a processor; and a computer readable medium coupled to the processor, the computer readable medium comprising code for implementing a method of indirectly pairing a trusted device with an untrusted device, the code, when executed by the processor, causing the processor to; obtain a pairing identifier provided by the untrusted device, wherein the untrusted device sends a pairing identifier request to an untrusted device controller, wherein the untrusted device controller sends the pairing identifier to the untrusted device and sends the pairing identifier and an untrusted device controller identifier to a trusted intermediary, and wherein the trusted intermediary stores the pairing identifier and the untrusted device controller identifier, one in association with the other, in a pairing identifier database, send a pairing request including the pairing identifier to an intermediary computer, wherein the intermediary computer extracts the pairing identifier from the pairing request, searches the pairing identifier database for a matching pairing identifier, and sends the pairing request to the untrusted device controller associated with the matching pairing identifier, receive a pairing confirmation from the intermediary computer indicating that the trusted device is indirectly paired to the untrusted device such that the trusted device can complete a transaction with the untrusted device without communicating transaction information to the untrusted device, send a transaction request for the transaction with the untrusted device to the intermediary computer, wherein the intermediary computer sends the transaction request to the untrusted device controller, and receive a transaction response from the intermediary computer indicating that the transaction is completed, wherein the intermediary computer receives a response associated with the transaction request from the untrusted device controller, the transaction response based on the response from the untrusted device controller. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification