Secure near field communications
First Claim
Patent Images
1. A method for securing Near Field Communications (NFC), comprising:
- magnetically inducing, by an initiating device, an NFC carrier wave with a target device;
initiating, by the initiating device, a handshake procedure with the target device;
generating, on the initiating device, a hidden key;
modulating the NFC carrier wave, by the initiating device, according to the hidden key;
receiving, by the initiating device from the target device, a data signal encoded on the NFC carrier wave modulated by the hidden key and the data signal; and
interpreting, by the initiating device, the NFC carrier wave according to the hidden key to return the data signal encoded on the NFC carrier wave.
1 Assignment
0 Petitions
Accused Products
Abstract
The security of Near Field Communications (NFC) against eavesdroppers is improved by encoding a hidden key, private to an initiating device, onto the carrier wave when a target device communicates its data via the carrier. The initiating device, in possession of the hidden key, is enabled to undo the scrambling effects of the hidden key to thereby privately interpret the data encoded onto the carrier wave by the target device. In various aspects, the hidden key is a one-time-use key that is randomly generated, used, and then discarded, preventing malicious parties from gaining the hidden key to later interpret intercepted data signals.
23 Citations
20 Claims
-
1. A method for securing Near Field Communications (NFC), comprising:
-
magnetically inducing, by an initiating device, an NFC carrier wave with a target device; initiating, by the initiating device, a handshake procedure with the target device; generating, on the initiating device, a hidden key; modulating the NFC carrier wave, by the initiating device, according to the hidden key; receiving, by the initiating device from the target device, a data signal encoded on the NFC carrier wave modulated by the hidden key and the data signal; and interpreting, by the initiating device, the NFC carrier wave according to the hidden key to return the data signal encoded on the NFC carrier wave. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An actively communicating device providing secure Near Field Communications (NFC) with a passively communicating device, the actively communicating device comprising:
-
an antenna, configured to send and receive radio frequency signals; a key buffer, configured to store a hidden key; a modulator, in communication with the antenna and the key buffer, wherein the modulator is configured to; produce a magnetic carrier wave transmitted via the antenna for communication with the passively communicating device; encode a handshake signal onto the magnetic carrier wave to initiate communications with the passively communicating device; and in response to receiving a response to the handshake signal from the passively communicating device, encode the hidden key onto the magnetic carrier wave; and a demodulator in communication with the antenna and the key buffer, wherein the demodulator is configured to; interpret the response from the passively communicating device by decoding a data signal encoded onto the magnetic carrier wave by the passively communicating device in light of the hidden key. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A system for securing Near Field Communications (NFC), comprising:
-
a processor; and a memory storage device including instructions, which when executed by the processor are operable to provide; a modulator, configured to generate a carrier wave and encode data onto the carrier wave; a demodulator, configured to observe the carrier wave to interpret data signals encoded onto the carrier wave; a key buffer in communication with the modulator and the demodulator, configured to store a hidden key; wherein the hidden key is encoded onto the carrier wave by the modulator to scramble a data signal received from a target device; and wherein the hidden key is used by the demodulator to unscramble the data signal received from the target device. - View Dependent Claims (17, 18, 19, 20)
-
Specification