Dynamic pairing system for securing a trusted communication channel
First Claim
1. A method comprising:
- receiving, by a processor, a request from a mobile device for a transaction from a user;
retrieving, by the processor and from a trust mediator, security-related sensor data including at least one of changes or signatures in a security characteristic of a network component;
computing, by the processor, a risk level associated with the transaction, the risk level being based on the transaction and the security-related sensor data;
transmitting, by the processor and to the trust mediator, the risk level for modifying security safeguards in the network component to maintain a security level for the transaction;
receiving, by the processor and from the mobile device, user identification data of the user, the user identification data comprising decoded information,the mobile device obtaining the decoded information by capturing, using a camera, hidden coded information imprinted on a transaction instrument of the user and decoding, using pattern recognition software, the hidden coded information, the hidden coded information comprising a variation in a controllable parameter comprising at least one of a color, a text positioning offset, or a text shape, and the hidden coded information being undetectable by a human eye without assistance of a device capable of detecting the hidden coded information;
computing, by the processor, a user trust score of the user based on the user identification data;
matching, by the processor, the risk level to a corresponding one of a plurality of risk levels;
identifying, by the processor, one of a plurality of user trust scores that corresponds to the corresponding one of the plurality of risk levels matched in the matching; and
authorizing the transaction based on a determination, by the processor, that the user trust score associated with the user is greater than or equal to the corresponding one of the plurality of risk levels.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, method, and computer-readable medium for securing a mobile financial transaction are provided. A table matches each one of a plurality of transaction risk levels to a corresponding one of a plurality of required user trust scores, correspondingly. A financial transaction risk level associated with a financial transaction is computed. A user trust score associated with the user is computed based on user identification data associated with the user. The financial transaction risk level is matched to a corresponding one of the plurality of transaction risk levels stored in the table. The one of the plurality of required trust scores that corresponds to the corresponding one of the plurality of transaction risk levels stored in the table is identified. If the user trust score is greater than or equal to the identified one of the plurality of required trust scores, then the financial transaction is authorized.
136 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a processor, a request from a mobile device for a transaction from a user; retrieving, by the processor and from a trust mediator, security-related sensor data including at least one of changes or signatures in a security characteristic of a network component; computing, by the processor, a risk level associated with the transaction, the risk level being based on the transaction and the security-related sensor data; transmitting, by the processor and to the trust mediator, the risk level for modifying security safeguards in the network component to maintain a security level for the transaction; receiving, by the processor and from the mobile device, user identification data of the user, the user identification data comprising decoded information, the mobile device obtaining the decoded information by capturing, using a camera, hidden coded information imprinted on a transaction instrument of the user and decoding, using pattern recognition software, the hidden coded information, the hidden coded information comprising a variation in a controllable parameter comprising at least one of a color, a text positioning offset, or a text shape, and the hidden coded information being undetectable by a human eye without assistance of a device capable of detecting the hidden coded information; computing, by the processor, a user trust score of the user based on the user identification data; matching, by the processor, the risk level to a corresponding one of a plurality of risk levels; identifying, by the processor, one of a plurality of user trust scores that corresponds to the corresponding one of the plurality of risk levels matched in the matching; and authorizing the transaction based on a determination, by the processor, that the user trust score associated with the user is greater than or equal to the corresponding one of the plurality of risk levels. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a processor; and a tangible, non-transitory memory configured to communicate with the processor, the tangible, non-transitory memory having instructions stored thereon that, in response to execution by the processor, cause the processor to perform operations comprising; receiving, by the processor, a request from a mobile device for a transaction from a user; retrieving, by the processor and from a trust mediator, security-related sensor data including at least one of changes or signatures in a security characteristic of a network component; computing, by the processor, a risk level associated with the transaction, the risk level being based on the transaction and the security-related sensor data; transmitting, by the processor and to the trust mediator, the risk level for modifying security safeguards in the network component to maintain a security level for the transaction; receiving, by the processor and from the mobile device, user identification data of the user, the user identification data comprising decoded information, the mobile device obtaining the decoded information by capturing, using a camera, hidden coded information imprinted on a transaction instrument of the user and decoding, using pattern recognition software, the hidden coded information, the hidden coded information comprising a variation in a controllable parameter comprising at least one of a color, a text positioning offset, or a text shape, and the hidden coded information being undetectable by a human eye without assistance of a device capable of detecting the hidden coded information; computing, by the processor, a user trust score of the user based on the user identification data; matching, by the processor, the risk level to a corresponding one of a plurality of risk levels; identifying, by the processor, one of a plurality of user trust scores that corresponds to the corresponding one of the plurality of risk levels matched in the matching; and authorizing the transaction based on a determination, by the processor, that the user trust score associated with the user is greater than or equal to the corresponding one of the plurality of risk levels. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium having stored thereon sequences of instructions, the sequences of instructions including instructions, which, when executed by a computer system, cause the computer system to:
-
receive, by the computer system, a request from a mobile device for a transaction from a user; retrieve, by the computer system and from a trust mediator, security-related sensor data including at least one of changes or signatures in a security characteristic of a network component; compute, by the computer system, a risk level associated with the transaction, the risk level being based on the transaction and the security-related sensor data; transmit, by the computer system and to the trust mediator, the risk level for modifying security safeguards in the network component to maintain a security level for the transaction; receive, by the computer system and from the mobile device, user identification data of the user, the user identification data comprising decoded information, the mobile device obtaining the decoded information by capturing, using a camera, hidden coded information imprinted on a transaction instrument of the user and decoding, using pattern recognition software, the hidden coded information, the hidden coded information comprising a variation in a controllable parameter comprising at least one of a color, a text positioning offset, or a text shape, and the hidden coded information being undetectable by a human eye without assistance of a device capable of detecting the hidden coded information; compute, by the computer system, a user trust score of the user based on the user identification data; match, by the computer system, the risk level to a corresponding one of a plurality of risk levels; identify, by the computer system, one of a plurality of user trust scores that corresponds to the corresponding one of the plurality of risk levels matched in the matching; and authorize the transaction based on a determination, by the computer system, that the user trust score associated with the user is greater than or equal to the corresponding one of the plurality of risk levels. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification