Systems and methods for device to device authentication
First Claim
1. A method for authenticating a user device by an authentication computing device, the method comprising:
- generating, using the authentication computing device, a locked data file for use in authenticating a user device enrolled in an authentication service, the locked data file configured to process a challenge and generate a challenge response;
transmitting the locked data file from the authentication computing device to a first user device as part of the first user device enrolling in the authentication service, causing the locked data file to be installed on the first user device;
receiving, at the authentication computing device, an authentication request for a transaction initiated using the first user device;
generating, using the authentication computing device, the challenge based on the authentication request;
transmitting the challenge directly from the authentication computing device to the first user device, wherein the challenge requests a current activated lifetime of the locked data file, and wherein the current activated lifetime is a time difference between a first time when the first user device receives the locked data file and a second time when the first user device receives the challenge; and
receiving, at the authentication computing device, the challenge response directly from the first user device to authenticate the first user device, wherein the challenge response includes the current activated lifetime.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for authenticating a user device by an authentication computing device is provided. The method includes generating, using the authentication computing device, a locked data file for use in authenticating a user device enrolled in an authentication service, the locked data file is configured to process a challenge and generate a challenge response. The method further includes transmitting the locked data file from the authentication computing device to a first user device as part of the first device enrolling in the authentication service, receiving, at the authentication computing device, an authentication request, generating, using the authentication computing device, the challenge based on the authentication request, transmitting the challenge from the authentication computing device to the first user device, and receiving, at the authentication computing device, the challenge response from the first user device to authenticate the first user device.
-
Citations
11 Claims
-
1. A method for authenticating a user device by an authentication computing device, the method comprising:
-
generating, using the authentication computing device, a locked data file for use in authenticating a user device enrolled in an authentication service, the locked data file configured to process a challenge and generate a challenge response; transmitting the locked data file from the authentication computing device to a first user device as part of the first user device enrolling in the authentication service, causing the locked data file to be installed on the first user device; receiving, at the authentication computing device, an authentication request for a transaction initiated using the first user device; generating, using the authentication computing device, the challenge based on the authentication request; transmitting the challenge directly from the authentication computing device to the first user device, wherein the challenge requests a current activated lifetime of the locked data file, and wherein the current activated lifetime is a time difference between a first time when the first user device receives the locked data file and a second time when the first user device receives the challenge; and receiving, at the authentication computing device, the challenge response directly from the first user device to authenticate the first user device, wherein the challenge response includes the current activated lifetime. - View Dependent Claims (2, 3, 4)
-
-
5. An authentication computing device for authenticating a user device, said authentication computing device comprising one or more processors in communication with one or more memory devices, said authentication computing device configured to:
-
generate a locked data file for use in authenticating a user device enrolled in an authentication service, the locked data file configured to process a challenge and generate a challenge response; transmit the locked data file to a first user device as part of the first user device enrolling in the authentication service, causing the locked data file to be installed on the first user device; receive an authentication request for a transaction initiated using the first user device; generate the challenge based on the authentication request; transmit the challenge directly from said authentication computing device to the first user device, wherein the challenge requests a current activated lifetime of the locked data file, and wherein the current activated lifetime is a time difference between a first time when the first user device receives the locked data file and a second time when the first user device receives the challenge; and receive the challenge response directly from the first user device to authenticate the first user device, wherein the challenge response includes the current activated lifetime. - View Dependent Claims (6, 7, 8)
-
-
9. A non-transitory computer-readable storage medium having computer-executable instructions embodied thereon, wherein when executed by an authentication computing device having one or more processors in communication with one or more memory devices, the computer-executable instructions cause the authentication computing device to:
-
generate a locked data file for use in authenticating a user device enrolled in an authentication service, wherein the locked data file is configured to process a challenge and generate a challenge response; transmit the locked data file to a first user device as part of the first user device enrolling in the authentication service, causing the locked data file to be installed on the first user device; receive an authentication request for a transaction initiated using the first user device; generate the challenge based on the authentication request; transmit the challenge directly from the authentication computing device to the first user device, wherein the challenge requests a current activated lifetime of the locked data file, and wherein the current activated lifetime is a time difference between a first time when the first user device receives the locked data file and a second time when the first user device receives the challenge; and receive the challenge response directly from the first user device to authenticate the first user device, wherein the challenge response includes the current activated lifetime. - View Dependent Claims (10, 11)
-
Specification