Secure authentication of user and mobile device
First Claim
1. A method for authentication, comprising:
- receiving, by a mobile device, a user request to access a service provider application;
in response to the user request to access the service provider application, requesting, by the mobile device, using the service provider application, identification and verification from a user via an identification and verification application residing within the mobile device;
receiving, by the identification and verification application on the mobile device, a positive identification and verification response;
generating, by a cryptogram generation module in the mobile device, a cryptogram using at least a user identification (ID) associated with the user, and a service provider device ID; and
transmitting, by the mobile device, the generated cryptogram, the user ID, and the service provider device ID to a service provider computer associated with the service provider application,wherein the service provider computer verifies the cryptogram using at least the user ID and the service provider device ID.
0 Assignments
0 Petitions
Accused Products
Abstract
An authentication method is disclosed. To authenticate a user, a mobile device may request identification and verification from the user. Upon receiving a positive identification and verification response from the user, the mobile device may generate a cryptogram using a user identification (ID) associated with the user, a timestamp, a device ID associated with the mobile device, a service provider application ID associated with the service provider application, and a service provider device ID. The mobile device may transmit the generated cryptogram, the user ID, the timestamp, the device ID, the service provider application ID, and the service provider device ID, to a service provider computer associated with the service provider application. The service provider computer may decrypt the cryptogram and compare the decrypted data elements to the received data elements to validate and authenticate the user.
-
Citations
21 Claims
-
1. A method for authentication, comprising:
-
receiving, by a mobile device, a user request to access a service provider application; in response to the user request to access the service provider application, requesting, by the mobile device, using the service provider application, identification and verification from a user via an identification and verification application residing within the mobile device; receiving, by the identification and verification application on the mobile device, a positive identification and verification response; generating, by a cryptogram generation module in the mobile device, a cryptogram using at least a user identification (ID) associated with the user, and a service provider device ID; and transmitting, by the mobile device, the generated cryptogram, the user ID, and the service provider device ID to a service provider computer associated with the service provider application, wherein the service provider computer verifies the cryptogram using at least the user ID and the service provider device ID. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A mobile device, comprising:
-
a processor; and a non-transitory computer readable medium, the non-transitory computer readable medium comprising code, executable by the processor, for implementing a method; receiving a user request to access a service provider application; in response to the user request to access the service provider application, requesting, using the service provider application, identification and verification from a user via an identification and verification application residing within the mobile device; receiving, by the identification and verification application on the mobile device, a positive identification and verification response; generating, by a cryptogram generation module on the mobile device, a cryptogram using at least a user identification (ID) associated with the user, and a service provider device ID; and transmitting the generated cryptogram, the user ID, and the service provider device ID to a service provider computer associated with the service provider application, wherein the service provider computer verifies the cryptogram, using at least the user ID and the service provider device ID. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for authentication, comprising:
-
receiving, by a service provider computer associated with a service provider application, a generated cryptogram, a user ID, and a service provider device ID from a mobile device, wherein the generated cryptogram was generated by a cryptogram generation module on the mobile device, by encrypting at least the user ID and the service provider device ID using the cryptogram generation module on the mobile device; decrypting, by the service provider computer, the received generated cryptogram; and verifying, by the service provider computer, the generated cryptogram by determining a plurality of data elements encoded within the generated cryptogram, and then comparing the determined plurality of data elements to at least the user ID and the service provider device ID received by the service provider computer. - View Dependent Claims (18, 19, 20)
-
-
21. A service provider computer comprising:
-
a processor; and a non-transitory computer readable medium, the non-transitory computer readable medium comprising code, executable by the processor to implement a method comprising, receiving, by the service provider computer associated with a service provider application, a generated cryptogram, a user ID, and a service provider device ID from a mobile device, wherein the generated cryptogram was generated by a cryptogram generation module on the mobile device, by encrypting at least the user ID and the service provider device ID using the cryptogram generation module on the mobile device; decrypting, by the service provider computer, the received generated cryptogram; and verifying, by the service provider computer, the generated cryptogram by determining a plurality of data elements encoded within the generated cryptogram, and then comparing the determined plurality of data elements to at least the user ID and the service provider device ID received by the service provider computer.
-
Specification