×

Device pairing via trusted intermediary

  • US 9,911,118 B2
  • Filed: 11/21/2013
  • Issued: 03/06/2018
  • Est. Priority Date: 11/21/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method of indirectly pairing a trusted device with an untrusted device through an untrusted device controller, the method comprising:

  • receiving, by an intermediary computer, a pairing identifier from the untrusted device controller;

    storing, by the intermediary computer, the pairing identifier received from the untrusted device controller and an untrusted device controller identifier in a pairing identifier database, the pairing identifier database associating the pairing identifier and the untrusted device controller identifier;

    receiving, by the intermediary computer, a pairing request from the trusted device, the pairing request including the pairing identifier associated with the untrusted device controller;

    extracting, by the intermediary computer, the pairing identifier from the pairing request received from the trusted device;

    searching, by the intermediary computer, the pairing identifier database for a matching pairing identifier that matches the pairing identifier received in the pairing request from the trusted device, the pairing identifier database associating the pairing identifier with the untrusted device controller identifier;

    determining, by the intermediary computer, the untrusted device controller based on the untrusted device controller identifier associated with the matching pairing identifier in the pairing identifier database;

    sending, by the intermediary computer, the pairing request to the untrusted device controller associated with the matching pairing identifier in the pairing identifier database, wherein the untrusted device controller identifies the untrusted device, associates the pairing identifier with the intermediary computer, and locks the pairing identifier;

    receiving, by the intermediary computer, a pairing response from the untrusted device controller indicating that the untrusted device is paired with the intermediary computer;

    sending, by the intermediary computer, a pairing confirmation to the trusted device, wherein the trusted device is indirectly paired to the untrusted device and wherein the trusted device is configured to complete a transaction with the untrusted device without communicating transaction information to the untrusted device;

    receiving, by the intermediary computer, a transaction request from the trusted device; and

    sending, by the intermediary computer, the transaction request to the untrusted device controller based on the trusted device being indirectly paired to the untrusted device, wherein the untrusted device controller processes the transaction request and commands the untrusted device to complete the transaction.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×