Abstract: Described herein are architectures, platforms and methods for offloading process or application from a near field communication (NFC) master device for proxy delegation to a proxy NFC device.
Claims:1. A near field communication (NFC) device comprising:
one or more processors;
a memory coupled to the one or more processors comprised of an application and information used by a remote proxy NFC device to perform a one time transaction with a third NFC device; and
an offloader coupled to the one or more processors and the memory \and configured to send the application and information to the remote proxy NFC device.
, Description:BACKGROUND
Near field communication (NFC) is used by devices to conduct various transactions. Examples of such transactions include payment, purchases, unlocking doors, etc. NFC devices are designed to be in close proximity with one another to perform such communications and transactions.
There may be certain situations when an NFC device configured to perform a specific transaction with another NFC device (e.g., NFC reader), is not available to a user. For example, a user may have left his NFC device at home and desires entry through a door that is controlled by an NFC enabled lock. The user needs the NFC device to enter. In another example, a third party, such as relative of the user desires to make a purchase through a transaction with an NFC reader. The third party needs credentials from the user’s NFC device to perform the transaction; however, the user can not just simply hand over the user’s NFC device to the third party. The third party may have an NFC device, but that NFC device is not properly enabled to perform the transaction.
A typical solution addressing the described issues includes what may be called NFC range extension, which provides for a master NFC device and a proxy NFC device. The master NFC device may provide data/information to the proxy NFC device over a network, such as the Internet, using a bridging tunnel protocol (e.g. https, etc.).
Such solutions may be vulnerable to replay attacks, where another party (e.g., “man in the middle”) may steal the transmitted data/information. In other instances, the credentials may be reused by the third party or other parties. Furthermore, that protocols that are used may involve latency between the master NFC device and proxy NFC device, leading to problems of the NFC reader verifying/using the data/information provided from the master NFC device to the proxy NFC device.
| Section | Controller | Decision Date |
|---|---|---|
| # | Name | Date |
|---|---|---|
| 1 | 6137-CHE-2015-Correspondence to notify the Controller [27-10-2022(online)].pdf | 2022-10-27 |
| 1 | Drawing [13-11-2015(online)].pdf | 2015-11-13 |
| 2 | Description(Complete) [13-11-2015(online)].pdf | 2015-11-13 |
| 2 | 6137-CHE-2015-Correspondence to notify the Controller [29-07-2022(online)].pdf | 2022-07-29 |
| 3 | 6137-CHE-2015-US(14)-HearingNotice-(HearingDate-03-11-2022).pdf | 2022-07-16 |
| 3 | 6137-CHE-2015-Power of Attorney-100216.pdf | 2016-06-28 |
| 4 | 6137-CHE-2015-ABSTRACT [27-05-2020(online)].pdf | 2020-05-27 |
| 4 | 6137-CHE-2015-Correspondence-PA-100216.pdf | 2016-06-28 |
| 5 | 6137-CHE-2015-FER.pdf | 2019-11-27 |
| 5 | 6137-CHE-2015-CLAIMS [27-05-2020(online)].pdf | 2020-05-27 |
| 6 | 6137-CHE-2015-Information under section 8(2) [13-05-2020(online)].pdf | 2020-05-13 |
| 6 | 6137-CHE-2015-FER_SER_REPLY [27-05-2020(online)].pdf | 2020-05-27 |
| 7 | 6137-CHE-2015-OTHERS [27-05-2020(online)].pdf | 2020-05-27 |
| 7 | 6137-CHE-2015-FORM 3 [13-05-2020(online)].pdf | 2020-05-13 |
| 8 | 6137-CHE-2015-OTHERS [27-05-2020(online)].pdf | 2020-05-27 |
| 8 | 6137-CHE-2015-FORM 3 [13-05-2020(online)].pdf | 2020-05-13 |
| 9 | 6137-CHE-2015-Information under section 8(2) [13-05-2020(online)].pdf | 2020-05-13 |
| 9 | 6137-CHE-2015-FER_SER_REPLY [27-05-2020(online)].pdf | 2020-05-27 |
| 10 | 6137-CHE-2015-CLAIMS [27-05-2020(online)].pdf | 2020-05-27 |
| 10 | 6137-CHE-2015-FER.pdf | 2019-11-27 |
| 11 | 6137-CHE-2015-ABSTRACT [27-05-2020(online)].pdf | 2020-05-27 |
| 11 | 6137-CHE-2015-Correspondence-PA-100216.pdf | 2016-06-28 |
| 12 | 6137-CHE-2015-US(14)-HearingNotice-(HearingDate-03-11-2022).pdf | 2022-07-16 |
| 12 | 6137-CHE-2015-Power of Attorney-100216.pdf | 2016-06-28 |
| 13 | Description(Complete) [13-11-2015(online)].pdf | 2015-11-13 |
| 13 | 6137-CHE-2015-Correspondence to notify the Controller [29-07-2022(online)].pdf | 2022-07-29 |
| 14 | Drawing [13-11-2015(online)].pdf | 2015-11-13 |
| 14 | 6137-CHE-2015-Correspondence to notify the Controller [27-10-2022(online)].pdf | 2022-10-27 |
| 1 | SearchStrategyMatrix1_13-11-2019.pdf |