DEVICE PAIRING VIA TRUSTED INTERMEDIARY
First Claim
1. A method of indirectly pairing a trusted device with an untrusted device through an untrusted device controller, the method comprising:
- receiving a pairing request from the trusted device, the pairing request including a pairing identifier associated with the untrusted device controller;
extracting the pairing identifier from the pairing request;
searching a pairing identifier database for a matching pairing identifier;
determining, by a computer, the untrusted device controller associated with the matching pairing identifier in the pairing identifier database;
sending the pairing request to the untrusted device controller, wherein the untrusted device controller identifies the untrusted device, associates the pairing identifier with the computer, and locks the pairing identifier;
receiving a pairing response from the untrusted device controller indicating that the untrusted device is paired with the computer; and
sending a pairing confirmation to the trusted device,wherein the trusted device is indirectly paired to the untrusted device and wherein the trusted device is configured to complete a transaction with the untrusted device without communicating transaction information to the untrusted device.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments are directed at systems, apparatuses, and methods for indirect device pairing through a trusted intermediary. One embodiment is directed to a method including receiving a pairing identifier associated with an untrusted device controller. The method further comprises extracting the pairing identifier from the pairing request, searching a pairing identifier database for a matching pairing identifier, determining an untrusted device controller associated with the matching pairing identifier, and sending the pairing request to the untrusted device controller. The untrusted device controller may identify the untrusted device, associate the pairing identifier with the trusted intermediary, and lock the pairing identifier. The method further comprises receiving a pairing response indicating that the untrusted device is paired with the computer. Accordingly, the trusted device is indirectly paired to the untrusted device and the trusted device is configured to complete a transaction with the untrusted device without communicating transaction information to the untrusted device.
290 Citations
20 Claims
-
1. A method of indirectly pairing a trusted device with an untrusted device through an untrusted device controller, the method comprising:
-
receiving a pairing request from the trusted device, the pairing request including a pairing identifier associated with the untrusted device controller; extracting the pairing identifier from the pairing request; searching a pairing identifier database for a matching pairing identifier; determining, by a computer, the untrusted device controller associated with the matching pairing identifier in the pairing identifier database; sending the pairing request to the untrusted device controller, wherein the untrusted device controller identifies the untrusted device, associates the pairing identifier with the computer, and locks the pairing identifier; receiving a pairing response from the untrusted device controller indicating that the untrusted device is paired with the computer; and sending a pairing confirmation to the trusted device, wherein the trusted device is indirectly paired to the untrusted device and wherein the trusted device is configured to complete a transaction with the untrusted device without communicating transaction information to the untrusted device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer comprising:
-
a processor; and a computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor for implementing a method of indirectly pairing a trusted device with an untrusted device through an untrusted device controller, the method comprising; receiving a pairing request from the trusted device, the pairing request including a pairing identifier associated with the untrusted device controller; extracting the pairing identifier from the pairing request; searching a pairing identifier database for a matching pairing identifier; determining the untrusted device controller associated with the matching pairing identifier in the pairing identifier database; sending the pairing request to the untrusted device controller, wherein the untrusted device controller identifies the untrusted device, associates the pairing identifier with the computer, and locks the pairing identifier; receiving a pairing response from the untrusted device controller indicating that the untrusted device is paired with the computer; and sending a pairing confirmation to the trusted device, wherein the trusted device is indirectly paired to the untrusted device and wherein the trusted device is configured to complete a transaction with the untrusted device without communicating transaction information to the untrusted device. - View Dependent Claims (7, 8, 9)
-
-
10. A method of indirectly pairing a trusted device with an untrusted device through a trusted intermediary computer, the method comprising:
-
receiving a pairing identifier request from an untrusted device; determining, by an untrusted device controller, an available pairing identifier; associating, by the untrusted device controller, the available pairing identifier with the untrusted device; sending a pairing identifier response including the pairing identifier to the untrusted device to be displayed to a consumer; receiving a pairing request including the pairing identifier from the trusted intermediary computer; identifying, by the untrusted device controller, the untrusted device associated with the pairing request; associating, by the untrusted device controller, the pairing identifier with the trusted intermediary computer; locking, by the untrusted device controller, the pairing identifier from additional pairing requests; sending a pairing notification to the untrusted device; and sending a pairing response to the trusted intermediary computer, wherein the trusted intermediary computer notifies the consumer that the trusted device is paired, wherein the trusted device is indirectly paired to the untrusted device through the trusted intermediary computer and wherein the trusted device completes a transaction at the untrusted device without communicating transaction information to the untrusted device. - View Dependent Claims (11, 12, 13)
-
-
14. A computer comprising:
-
a processor; and a computer readable medium coupled to the processor, the computer readable medium comprising code, executable by the processor for implementing a method comprising; receiving a pairing identifier request from an untrusted device associated with the untrusted device controller; determining an available pairing identifier; associating the available pairing identifier with the untrusted device; sending a pairing identifier response including the pairing identifier to the untrusted device to be displayed to a consumer; receiving a pairing request including the pairing identifier from a trusted intermediary computer; identifying the untrusted device associated with the pairing request; associating the pairing identifier with the trusted intermediary computer; locking the pairing identifier from additional pairing requests; sending a pairing notification to the untrusted device; and sending a pairing response to the trusted intermediary computer, wherein the trusted intermediary computer notifies the consumer that the trusted device is paired, wherein the trusted device is indirectly paired to the untrusted device through the trusted intermediary computer and wherein the trusted device completes a transaction at the untrusted device without communicating transaction information to the untrusted device. - View Dependent Claims (15, 16, 17)
-
-
18. A system for indirectly pairing a trusted device with an untrusted device, the system comprising:
-
the untrusted device associated with an untrusted device controller, the untrusted device configured to request a pairing identifier from the untrusted device controller and display the pairing identifier to the consumer; the untrusted device controller associated with the untrusted device, the untrusted device controller configured to receive a pairing identifier request from the untrusted device, identify an available pairing identifier, send the pairing identifier to the untrusted device, and receiving a pairing request from a trusted intermediary computer, identify the untrusted device associated with the pairing identifier, associate the pairing identifier with the trusted intermediary computer, and lock the received pairing identifier from additional pairing requests; a trusted device operated by a consumer, the trusted device configured to send the pairing identifier to the trusted intermediary computer; the trusted intermediary computer associated with the trusted device, the trusted intermediary computer configured to receive the pairing identifier from the trusted device, determine the untrusted device controller and send a pairing request to the untrusted device controller to indirectly pair the untrusted device with the trusted device, wherein the trusted device is indirectly paired to the untrusted device through the trusted intermediary computer and wherein the trusted device completes a transaction at the untrusted device without communicating transaction information to the untrusted device. - View Dependent Claims (19, 20)
-
Specification