Systems and Methods for Authenticating Mobile Device Communications
First Claim
1. A computer-implemented method for authenticating communications, the method comprising:
- identifying a mobile device to which a message will be communicated;
generating, based upon a shared secret between a service provider and the mobile device, a payload authentication code (PAC);
associating the generated PAC with a payload for the message; and
communicating the message and the generated PAC to the mobile device, wherein the mobile device is configured to utilize the shared secret to verify the PAC and authenticate the message,wherein the above operations are performed by one or more computers associated with the service provider.
5 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide systems and methods for authenticating mobile device communications. A mobile device to which a message will be communicated may be identified. Based upon a shared secret between a service provider and the mobile device, a payload authentication code (“PAC”) may be generated, and the generated PAC may be associated with a payload for the message. The message and the generated PAC may then be communicated to the mobile device, and the mobile device may be configured to utilize the shared secret to verify the PAC and authenticate the message. In certain embodiments, the operations of the method may be performed by one or more computers associated with the service provider.
-
Citations
21 Claims
-
1. A computer-implemented method for authenticating communications, the method comprising:
-
identifying a mobile device to which a message will be communicated; generating, based upon a shared secret between a service provider and the mobile device, a payload authentication code (PAC); associating the generated PAC with a payload for the message; and communicating the message and the generated PAC to the mobile device, wherein the mobile device is configured to utilize the shared secret to verify the PAC and authenticate the message, wherein the above operations are performed by one or more computers associated with the service provider. - View Dependent Claims (2, 3, 4, 5, 6, 7, 21)
-
-
8. A system for authenticating communications, the system comprising:
-
at least one memory configured to store computer-executable instructions; and at least one processor configured to access the at least one memory and execute the computer-executable instructions to; identify a mobile device to which a message will be communicated; generate, based upon a shared secret between a service provider and the mobile device, a payload authentication code (PAC); associate the generated PAC with a payload for the message; and direct communication of the message and the generated PAC to the mobile device, wherein the mobile device is configured to utilize the shared secret to verify the PAC and authenticate the message. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method for authenticating communications, the method comprising:
-
receiving, by a mobile device comprising one or more computer processors, a message output by a service provider; identifying, by the mobile device based upon an analysis of the received message, a payload authentication code (PAC); verifying, by the mobile device based at least in part upon a shared secret between the mobile device and the service provider, the PAC; and authenticating, by the mobile device based at least in part upon the verification, a payload of the received message. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification