×

Mobile application security system and method

  • US 20130014248A1
  • Filed: 07/07/2011
  • Published: 01/10/2013
  • Est. Priority Date: 07/07/2011
  • Status: Active Grant
First Claim
Patent Images

1. An authentication server for authenticating a user of a computing device, the authentication server comprising:

  • a user directory stored in a computer readable memory, the user directory comprising a group of user records, each user record being uniquely associated with an authorized user;

    a computing device ID value unique to a computing device assigned to the authorized user associated with the user record;

    a group of depictions, each depiction having a group of unique fiducials;

    an identification of a key depiction, the key depiction being a single to depiction selected from the group of depictions; and

    trace pattern verification data, the trace pattern verification data comprising;

    a group of coordinate values, in sequential order, which represent a group of sequential trace stokes, each trace stroke of the group of sequential trace strokes being between a unique pair of fiducials of the group of fiducials within the key depiction.an authentication package received from an authenticating computing device, the authentication package comprising;

    an identifier of a selected depiction;

    captured trace pattern data, the captured trace pattern data comprising a group of sequential coordinate values which represent a group of sequential trace stokes;

    an authentication application comprising authentication instructions stored coded in the computer readable memory and executed by a processor, the authentication instructions comprising which, when executed by the processor;

    respond to receiving an authentication request from an authenticating computing device by providing, to the authenticating computing device, each depiction of the group of depictions in the user record with the computing device ID value that matches a device identifier of the authenticating computing device, the device identifier of the authenticating computing device;

    respond to receiving the authentication package from the authenticating computing device by generating a message to authorize access to protected functions only if;

    the identifier of the selected depiction indicates the key depiction of the user record with the computing device ID value which matches the device identifier of the authenticating computing device; and

    the group of sequential trace strokes represented by the sequential coordinate values of the captured trace pattern data matches, within a threshold, the group of sequential trace strokes between unique pairs of fiducials within the key depiction.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×