Sign In to Follow Application
View All Documents & Correspondence

Near Field Communications (Nfc) Based Offload Of Nfc Operation

Abstract: Described herein are architectures, platforms and methods for offloading process or application from a near field communication (NFC) master device for proxy delegation to a proxy NFC device.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
13 November 2015
Publication Number
35/2016
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
ipo@iphorizons.com
Parent Application

Applicants

Intel Corporation
2200 Mission College Boulevard, Santa Clara, California, 95054 USA

Inventors

1. POGORELIK, Oleg
ALONIM 12 LAPID, JM, IL 73133 ISRAEL
2. GOLTMAN , Gennady
GNESIN STR. 9/2 HAIFA, HA, IL 32447 ISRAEL
3. NAYSHTUT, Alex
HADAGAN 10/3 GAN YAVNE, D, IL 80700 ISRAEL
4. BALLESTEROS, Miguel
8595 MORGAN CREEK LANE ROSEVILLE, CA 95747 UNITED STATES OF AMERICA
5. PORAT , Shahar
GEVA CARMEL POB 95, GEVA CARMEL, HA, IL 30855 ISRAEL
6. SOFER, Sergey
4 ARTHUR RUBINSTEIN STR. RISHON LEZION, M, IL 75412 ISRAEL
7. SHARAGA, Avishay
JASMIN ROAD 165 BET NEHEMYA, M, IL 73140 ISRAEL

Specification

Claims:1. A near field communication (NFC) device comprising:
one or more processors;
a memory coupled to the one or more processors comprised of an application and information used by a remote proxy NFC device to perform a one time transaction with a third NFC device; and
an offloader coupled to the one or more processors and the memory \and configured to send the application and information to the remote proxy NFC device.
, Description:BACKGROUND
Near field communication (NFC) is used by devices to conduct various transactions. Examples of such transactions include payment, purchases, unlocking doors, etc. NFC devices are designed to be in close proximity with one another to perform such communications and transactions.
There may be certain situations when an NFC device configured to perform a specific transaction with another NFC device (e.g., NFC reader), is not available to a user. For example, a user may have left his NFC device at home and desires entry through a door that is controlled by an NFC enabled lock. The user needs the NFC device to enter. In another example, a third party, such as relative of the user desires to make a purchase through a transaction with an NFC reader. The third party needs credentials from the user’s NFC device to perform the transaction; however, the user can not just simply hand over the user’s NFC device to the third party. The third party may have an NFC device, but that NFC device is not properly enabled to perform the transaction.
A typical solution addressing the described issues includes what may be called NFC range extension, which provides for a master NFC device and a proxy NFC device. The master NFC device may provide data/information to the proxy NFC device over a network, such as the Internet, using a bridging tunnel protocol (e.g. https, etc.).
Such solutions may be vulnerable to replay attacks, where another party (e.g., “man in the middle”) may steal the transmitted data/information. In other instances, the credentials may be reused by the third party or other parties. Furthermore, that protocols that are used may involve latency between the master NFC device and proxy NFC device, leading to problems of the NFC reader verifying/using the data/information provided from the master NFC device to the proxy NFC device.

Documents

Orders

Section Controller Decision Date

Application Documents

# Name Date
1 6137-CHE-2015-Correspondence to notify the Controller [27-10-2022(online)].pdf 2022-10-27
1 Drawing [13-11-2015(online)].pdf 2015-11-13
2 Description(Complete) [13-11-2015(online)].pdf 2015-11-13
2 6137-CHE-2015-Correspondence to notify the Controller [29-07-2022(online)].pdf 2022-07-29
3 6137-CHE-2015-US(14)-HearingNotice-(HearingDate-03-11-2022).pdf 2022-07-16
3 6137-CHE-2015-Power of Attorney-100216.pdf 2016-06-28
4 6137-CHE-2015-ABSTRACT [27-05-2020(online)].pdf 2020-05-27
4 6137-CHE-2015-Correspondence-PA-100216.pdf 2016-06-28
5 6137-CHE-2015-FER.pdf 2019-11-27
5 6137-CHE-2015-CLAIMS [27-05-2020(online)].pdf 2020-05-27
6 6137-CHE-2015-Information under section 8(2) [13-05-2020(online)].pdf 2020-05-13
6 6137-CHE-2015-FER_SER_REPLY [27-05-2020(online)].pdf 2020-05-27
7 6137-CHE-2015-OTHERS [27-05-2020(online)].pdf 2020-05-27
7 6137-CHE-2015-FORM 3 [13-05-2020(online)].pdf 2020-05-13
8 6137-CHE-2015-OTHERS [27-05-2020(online)].pdf 2020-05-27
8 6137-CHE-2015-FORM 3 [13-05-2020(online)].pdf 2020-05-13
9 6137-CHE-2015-Information under section 8(2) [13-05-2020(online)].pdf 2020-05-13
9 6137-CHE-2015-FER_SER_REPLY [27-05-2020(online)].pdf 2020-05-27
10 6137-CHE-2015-CLAIMS [27-05-2020(online)].pdf 2020-05-27
10 6137-CHE-2015-FER.pdf 2019-11-27
11 6137-CHE-2015-ABSTRACT [27-05-2020(online)].pdf 2020-05-27
11 6137-CHE-2015-Correspondence-PA-100216.pdf 2016-06-28
12 6137-CHE-2015-US(14)-HearingNotice-(HearingDate-03-11-2022).pdf 2022-07-16
12 6137-CHE-2015-Power of Attorney-100216.pdf 2016-06-28
13 Description(Complete) [13-11-2015(online)].pdf 2015-11-13
13 6137-CHE-2015-Correspondence to notify the Controller [29-07-2022(online)].pdf 2022-07-29
14 Drawing [13-11-2015(online)].pdf 2015-11-13
14 6137-CHE-2015-Correspondence to notify the Controller [27-10-2022(online)].pdf 2022-10-27

Search Strategy

1 SearchStrategyMatrix1_13-11-2019.pdf