Enhancing the security of near-field communication
First Claim
1. A method comprising:
- providing, via a mobile device enabled as a first near-field communication (NFC) device, a user authentication for permitting NFC with a second NFC device, the user authentication related to an environmental object or a perspective of the mobile device specified by an end user of the mobile device;
determining whether the mobile device and the second NFC device are in proximity to one another; and
permitting NFC between the mobile device and the second NFC device when a detected action performed by a user with the mobile device is substantially similar to the provided user authentication and the mobile device and the second NFC device are in proximity to one another.
2 Assignments
0 Petitions
Accused Products
Abstract
Security of near-field communication (NFC) may be enhanced. A user authentication may be provided via a mobile device enabled as a first NFC device. The user authentication may be specified by an end user of the mobile device for permitting NFC with a second NFC device. The user authentication may be related to an environmental object or a perspective of the mobile device specified by the end user. It may be determined whether the mobile device and the second NFC device are in proximity to one another. When the mobile device and the second NFC device are in proximity to one another and a detected action performed by a user with the mobile device is substantially similar to the provided user authentication, NFC between the mobile device and the second NFC device may be permitted.
-
Citations
20 Claims
-
1. A method comprising:
-
providing, via a mobile device enabled as a first near-field communication (NFC) device, a user authentication for permitting NFC with a second NFC device, the user authentication related to an environmental object or a perspective of the mobile device specified by an end user of the mobile device; determining whether the mobile device and the second NFC device are in proximity to one another; and permitting NFC between the mobile device and the second NFC device when a detected action performed by a user with the mobile device is substantially similar to the provided user authentication and the mobile device and the second NFC device are in proximity to one another. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
detecting an action performed by a user with a mobile device; comparing, via a processor, the action performed by the user with the mobile device with a user authentication key, the user authentication key specified by an end user of the mobile device for permitting near-field communication (NFC) between the mobile device and a NFC device, the user authentication key related to an environmental object or a perspective of the mobile device specified by an end user; and determining, based on the comparing, whether to permit the NFC when the mobile device and the NFC device are in proximity to one another. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
a mobile device operable as a first near-field communications (NFC) device; and a mobile application executing on the mobile device and configured to store a user defined authentication key for permitting NFC communication with a second NFC device, the user authentication key relating to an environmental object or an orientation of the mobile device specified by the end user, wherein the mobile application is configured to determine when the mobile device and the second NFC device are in proximity to one another, detect an action of the mobile device, and permit NFC communication between the mobile device and the second NFC device when the mobile device and the second NFC device are in proximity to one another and the detected action is substantially similar to the defined user authentication key. - View Dependent Claims (17, 18, 19, 20)
-
Specification