CPC H04L 63/0838 (2013.01) [G06F 21/71 (2013.01); G06K 7/1417 (2013.01); G06K 19/06037 (2013.01); H04L 9/0869 (2013.01); H04L 9/3213 (2013.01); H04L 9/3228 (2013.01); H04L 63/0428 (2013.01); H04L 63/061 (2013.01); H04L 63/0853 (2013.01); H04L 63/0861 (2013.01); H04L 63/102 (2013.01); H04L 63/108 (2013.01); H04L 63/18 (2013.01); H04L 65/1069 (2013.01)] | 20 Claims |
1. A method for implementing a security protocol, the method comprising, by a trusted client device:
obtaining a one-time secret (OTS) displayed by a host device;
extracting information encoded within the OTS;
utilizing the information to transmit, to the host device, at least one message that causes the host device to transition from displaying the OTS to displaying instructions for verifying an identity of a user of the trusted client device;
verifying the identity of the user using at least one sensor of the trusted client device;
in response to verifying the identity of the user:
negotiating an encryption key with the host device based on the OTS,
establishing, using the encryption key, a communication session between the trusted client device and the host device; and
providing, via the communication session, credentials to the host device to enable the host device to perform at least one action.
|