System and method for device registration and authentication
First Claim
1. A method for authentication, comprising:
- a server comprising at least one computer processor receiving, from a mobile device and over a network, a first credential;
the server verifying the first credential;
in response to the verification of the first credential, transmitting, over the network and to the mobile device, a first key and a first value;
receiving, from the mobile device, the first value signed with a device key;
the server validating the first value signed with the device key; and
in response to the validation of the signed first key, the server authenticating the mobile device and a user associated with the mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for device registration and authentication are disclosed. In one embodiment, a method for authentication of a device may include (1) receiving, at a mobile device, a first credential; (2) transmitting, over a network, the first credential to a server; (3) receiving, from the server, a first key and a first value, the first value comprising a receipt for the first credential; (4) receiving, at the mobile device, a data entry for a second credential; (5) generating, by a processor, a second key from the data entry; (6) retrieving, by the mobile device, a third credential using the first key and the second key; (7) signing, by the mobile device, the first value with the third credential; and (8) transmitting, over the network, the signed third value to the server.
-
Citations
13 Claims
-
1. A method for authentication, comprising:
-
a server comprising at least one computer processor receiving, from a mobile device and over a network, a first credential; the server verifying the first credential; in response to the verification of the first credential, transmitting, over the network and to the mobile device, a first key and a first value; receiving, from the mobile device, the first value signed with a device key; the server validating the first value signed with the device key; and in response to the validation of the signed first key, the server authenticating the mobile device and a user associated with the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
Specification