Secure Transaction Systems and Methods
First Claim
1. A method performed by a trusted system comprising a processor and a non-transitory computer-readable storage medium storing instructions that, when executed, cause the system to perform the method, the method comprising:
- receiving, at an interface of the trusted system from an authentication device, a first challenge response generated by a secure tag;
generating, based on challenge information and secret information stored by the trusted system, a second challenge response;
comparing the first challenge response with the second challenge response;
determining that the first challenge response and the second challenge response match; and
sending, via the interface of the trusted system to the authentication device, a response authenticating the secure tag.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are described that use tag authentication and presence verification techniques in connection with a variety of transactions. In certain embodiments, an authentication device may verify the authenticity of a secure tag by determining whether the secure tag stores secret information provisioned by a trusted authority. In some embodiments, such an authentication process may be performed without exposing the secret information to the authentication device, thereby maintaining integrity of the secure tag. In other embodiments, insecure tags and/or tags that do not include secret information are used.
86 Citations
13 Claims
-
1. A method performed by a trusted system comprising a processor and a non-transitory computer-readable storage medium storing instructions that, when executed, cause the system to perform the method, the method comprising:
-
receiving, at an interface of the trusted system from an authentication device, a first challenge response generated by a secure tag; generating, based on challenge information and secret information stored by the trusted system, a second challenge response; comparing the first challenge response with the second challenge response; determining that the first challenge response and the second challenge response match; and sending, via the interface of the trusted system to the authentication device, a response authenticating the secure tag. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
Specification