US 12,443,731 B2
Secure document transfer
Nicholas J. Shearer, San Francisco, CA (US); Sunil Nair, Fremont, CA (US); Felix-Johannes A. Visée, London (GB); Eric K. Kimn, San Jose, CA (US); and Salma Elshatanoufy, Cupertino, CA (US)
Assigned to Apple Inc., Cupertino, CA (US)
Filed by Apple Inc., Cupertino, CA (US)
Filed on Jun. 2, 2023, as Appl. No. 18/205,374.
Prior Publication US 2024/0403456 A1, Dec. 5, 2024
Int. Cl. G06F 21/62 (2013.01); G06F 21/35 (2013.01); G06F 21/60 (2013.01)
CPC G06F 21/6209 (2013.01) [G06F 21/35 (2013.01); G06F 21/602 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising:
receiving, at a host server from a user device, a public key, a user identifier, and a first request identifier, the first request identifier generated by the user device utilizing details of an interaction between a near-field communication (NFC) terminal and the user device;
receiving, at the host server from a third-party server, a public key request that includes a second request identifier, the second request identifier generated by the third-party server utilizing the details of the interaction; comparing, by the host server, the first request identifier to the second request identifier; transmitting, by the host server, the public key to the third-party server in response to determining a match between the first request identifier and the second request identifier; receiving, at the host server from the third-party server, an encrypted document and the second request identifier, the encrypted document being encrypted utilizing the public key;
and transmitting, by the host server, the encrypted document to the user device based at least in part on the user identifier, wherein the user device is configured to: receive the encrypted document from the host; decrypt the encrypted document to obtain a decrypted document utilizing a private key corresponding to the public key; and present the decrypted document on a user interface of the user device, wherein the host server does not have access to the private key corresponding to the public key, and wherein the host server is unable to decrypt the encrypted document.