SYSTEMS AND METHODS FOR NFC ACCESS CONTROL IN A SECURE ELEMENT CENTRIC NFC ARCHITECTURE
First Claim
1. A computer-readable medium storing computer-executable instructions which, when executed by a processor, cause the processor to perform operations comprising:
- receiving a request for information;
processing the received request to identify a first access level associated with the request and a second access level associated with an originator of the request;
determining if the first access level matches the second access level;
in response to determining the first access level does not match the second access level, transmitting a message to the originator of the request indicating a denial of the request; and
in response to determining the first access level matches the second access level,transmitting the request to a near field communication (NFC) controller;
receiving information from the NFC controller; and
transmitting the information from the NFC controller to the originator of the request.
0 Assignments
0 Petitions
Accused Products
Abstract
This disclosure describes systems, methods, and computer-readable media related to near field communication (NFC) access control in a secure element centric NFC architecture. A secure element may receive a request for information and process the received request to identify a first access level associated with the request and a second access level associated with an originator of the request. The secure element may determine if the first access level matches the second access level. If the first access level does not match the second access level, the secure element may transmit a message to the originator of the request indicating a denial of the request. If the first access level does match the second access level, the secure element may transmit the request to a near field communication (NFC) controller, receive information from the NFC controller, and transmit the information from the NFC controller to the originator of the request.
-
Citations
24 Claims
-
1. A computer-readable medium storing computer-executable instructions which, when executed by a processor, cause the processor to perform operations comprising:
-
receiving a request for information; processing the received request to identify a first access level associated with the request and a second access level associated with an originator of the request; determining if the first access level matches the second access level; in response to determining the first access level does not match the second access level, transmitting a message to the originator of the request indicating a denial of the request; and in response to determining the first access level matches the second access level, transmitting the request to a near field communication (NFC) controller; receiving information from the NFC controller; and transmitting the information from the NFC controller to the originator of the request. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method comprising:
-
receiving, by a secure element, a request for information; processing, by the secure element, the received request to identify a first access level associated with the request and a second access level associated with an originator of the request; determining, by the secure element, if the first access level matches the second access level; in response to determining the first access level does not match the second access level, transmitting, by the secure element, a message to the originator of the request indicating a denial of the request; and in response to determining the first access level matches the second access level, transmitting, by the secure element, the request to a near field communication (NFC) controller; receiving, by the secure element, information from the NFC controller; and transmitting, by the secure element, the information from the NFC controller to the originator of the request. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A device comprising:
-
one or more antennas; one or more radios; at least one transceiver; at least one near field communication (NFC) controller; at least one processor; at least one memory storing computer-executable instructions; and at least one secure element, wherein the at least one secure element is configured to access the at least one memory and to execute the computer-executable instructions to; receive a request for information; process the received request to identify a first access level associated with the request and a second access level associated with an originator of the request; determine if the first access level matches the second access level; in response to a determination that the first access level does not match the second access level, transmit a message to the originator of the request indicating a denial of the request; and in response to a determination that the first access level matches the second access level, transmit the request to the at least one NFC controller; receive information from the at least one NFC controller; and transmit the information from the at least one NFC controller to the originator of the request. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
-
24-25. -25. (canceled)
Specification