Abstract

A user may desire to transfer account information, such as username, contact information, and installed applications from a source computing device, such as a smartphone, to a target computing device, such as a laptop computing device. The target computing device can generate and present a machine-readable code, such as a bar code or QR code, on a display included in the target computing device. The machine-readable code can include information to be included in an authentication process when the secure connection is established. The source computing device can capture an image of the code with a camera included in the source computing device. Capturing the image of the code ensures physical proximity and line-of-sight between the source computing device and the target computing device. After capturing the image of the machine-readable code, the source computing device prompts the user to approve a transfer of information, such as by entering a personal identification number or a thumbprint. After the source computing device receives the approval, the source computing device and target computing device can establish a secure connection via a short-range wireless networking protocol. The secure connection can include tokens or other information that were included in the machine-readable code that the source computing device received from the target computing device via line-of-sight. After establishing the secure connection via the wireless networking protocol, the source computing device transfers account information from the source computing device to the target computing device.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

COinS