Device-Pairing by Reading an Address Provided in Device-Readable Form
First Claim
1. A computer-implemented method for pairing a device with a client and performing a log-in procedure, comprising:
- providing an address of the client in a physical device-readable form;
establishing a first secure connection between the client and a server, the client communicating with the server over a network;
establishing a pairing relationship between the client and the device in response to reading of the address by the device;
establishing a second secure connection between the device and the server through the client, based on the pairing relationship established between the device and the client, the second secure connection being tunneled within the first secure connection; and
performing a log-in procedure over the second secure connection, enabling a user to gain access to a service provided by the server upon a successful outcome of the log-in procedure.
2 Assignments
0 Petitions
Accused Products
Abstract
A system is described for allowing a user, operating a trusted device, to remotely log into a server via a potentially untrustworthy client. The system operates by establishing a first secure connection between the client and the server. The system then establishes a second secure connection between the device and the server through the client. The user then remotely logs into the server over the second secure connection using the device. The second secure connection is tunneled within the first secure connection, preventing the untrustworthy client from discovering personal information associated with the user. According to one feature, prior to forming the second secure connection, the user can establish a pairing relationship with the client by reading an address of the client using any kind of reading mechanism. According to another feature, the device can receive marketing information in the course of a transaction.
50 Citations
20 Claims
-
1. A computer-implemented method for pairing a device with a client and performing a log-in procedure, comprising:
-
providing an address of the client in a physical device-readable form; establishing a first secure connection between the client and a server, the client communicating with the server over a network; establishing a pairing relationship between the client and the device in response to reading of the address by the device; establishing a second secure connection between the device and the server through the client, based on the pairing relationship established between the device and the client, the second secure connection being tunneled within the first secure connection; and performing a log-in procedure over the second secure connection, enabling a user to gain access to a service provided by the server upon a successful outcome of the log-in procedure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method for conducting a transaction in a merchandising environment, comprising:
-
providing an address of the client in a physical device-readable form; establishing a first secure connection between the client and a server, the client communicating with the server over a network; establishing a pairing relationship between the client and the device in response to reading of the address by the device; establishing a second secure connection between the device and the server through the client, based on the pairing relationship established between the device and the client, the second secure connection being tunneled within the first secure connection; performing a log-in procedure over the second secure connection, enabling a user to gain access to a service provided by the server upon a successful outcome of the log-in procedure; conducting a transaction over the second secure connection; and sending marketing information to the device via the second secure connection in a course of the transaction, the client representing an untrustworthy entity and the device representing a trusted entity. - View Dependent Claims (16, 17, 18)
-
-
19. A system for conducting a transaction with a portable device, comprising:
-
a client and server configured to establish a first secure connection between the client and the server, the client communicating with the server over a network; the client and the server configured to enable communication between the portable device and the server via a second secure connection that is established between the portable device and the server, the second secure connection being tunneled within the first secure connection; and the server and the client being configured to send marketing information to the portable device via the second secure connection in a course of a transaction conducted between the portable device and the server. - View Dependent Claims (20)
-
Specification