SYSTEMS AND METHODS FOR PROTECTING AGAINST RELAY ATTACKS
Systems, methods, and devices are disclosed for preventing relay attacks. A user device may receive (e.g., when proximate to the first access device), from an intervening device, device identificationdata for a first access device. A message may be received from a second access device via the interv...
Saved in:
Main Authors | , , , , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
07.07.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Systems, methods, and devices are disclosed for preventing relay attacks. A user device may receive (e.g., when proximate to the first access device), from an intervening device, device identificationdata for a first access device. A message may be received from a second access device via the intervening device. The message may include a digital signature generated based at least in part on second access device identification data. The user device may validate the message utilizing the digital signature and a public key. If the message is invalid, the user device may discard the message. If the message is valid, (e.g., unaltered), the user device may determine that the user has not confirmed an intent to interact with the second access device and may terminate an further interaction withthe second access device accordingly.
公开了用于防止中继攻击的系统、方法和装置。用户装置可以从介入装置接收(例如,当接近第一访问装置时)用于第一访问装置的装置标识数据。可以经由所述介入装置从第二访问装置接收消息。所述消息可以包括至少部分地基于第二访问装置标识数据生成的数字签名。所述用户装置可以利用所述数字签名和公钥验证所述消息。如果所述消息是无效的,那么所述用户装置可以丢弃所述消息。如果所述消息是有效的(例如, |
---|---|
Bibliography: | Application Number: CN201880076718 |