VERIFICATION OF SOFTWARE APPLICATION AUTHENTICITY
First Claim
1. A method of verifying authenticity of a software application, the method comprising:
- maintaining a set of application identifiers associated with a plurality of authenticated software applications;
receiving a verification request comprising an application identifier associated with an unverified software application;
generating a token in response to the verification request if the application identifier is in the set of application identifiers;
passing the generated token to the unverified software application;
receiving a user token;
processing the user token to determine whether the unverified software application is one of the authenticated software applications; and
sending a verification response based on the processing.
2 Assignments
0 Petitions
Accused Products
Abstract
Various techniques are provided for verifying the authenticity of software applications. Such techniques are particularly useful for verifying the authenticity of software applications used in online transactions involving users, payment service providers, and/or merchants. In one example, a set of application identifiers associated with a plurality of authenticated software applications are maintained and a verification request is received comprising an application identifier associated with an unverified software application. A token is generated in response to the verification request if the application identifier is in the set of application identifiers. The generated token is passed to the unverified software application. A user token is received and processed to determine whether the unverified software application is one of the authenticated software applications. A verification request is sent based on the processing. Additional methods and systems are also provided.
44 Citations
34 Claims
-
1. A method of verifying authenticity of a software application, the method comprising:
-
maintaining a set of application identifiers associated with a plurality of authenticated software applications; receiving a verification request comprising an application identifier associated with an unverified software application; generating a token in response to the verification request if the application identifier is in the set of application identifiers; passing the generated token to the unverified software application; receiving a user token; processing the user token to determine whether the unverified software application is one of the authenticated software applications; and sending a verification response based on the processing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
one or more processors; and one or more memories adapted to store a plurality of machine-readable instructions which when executed by the one or more processors are adapted to cause the system to; maintain a set of application identifiers associated with a plurality of authenticated software applications, receive a verification request comprising an application identifier associated with an unverified software application, generate a token in response to the verification request if the application identifier is in the set of application identifiers, pass the generated token to the unverified software application, receive a user token, process the user token to determine whether the unverified software application is one of the authenticated software applications, and send a verification response based on the processing. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of verifying authenticity of a software application, the method comprising:
-
generating a verification request comprising an application identifier associated with an unverified software application; receiving a generated token in response to the verification request, wherein the generated token is provided by a third party if the application identifier is in a set of application identifiers associated with a plurality of authenticated software applications approved by the third party; and displaying the generated token to a user. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
-
27. A system comprising:
-
one or more processors; and one or more memories adapted to store a plurality of machine-readable instructions which when executed by the one or more processors are adapted to cause the system to; generate a verification request comprising an application identifier associated with an unverified software application, receive a generated token in response to the verification request, wherein the generated token is provided by a third party if the application identifier is in a set of application identifiers associated with a plurality of authenticated software applications approved by the third party, and display the generated token to a user. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34)
-
Specification