SECURING PERSONAL IDENTIFICATION NUMBERS FOR MOBILE PAYMENT APPLICATIONS BY COMBINING WITH RANDOM COMPONENTS
First Claim
1. A computer-implemented method for securing personal identification numbers, the method comprising:
- receiving, by a computing device and from a user of the computing device, a user personal identification number (PIN) for a secure memory associated with the computing device;
generating, by the computing device, at least one random PIN component;
storing, by the computing device, the at least one random PIN component in at least one distinct location, wherein the at least one distinct location comprises a host memory of the computing device.determining, by the computing device, a secure memory PIN based at least in part on the user PIN and the at least one random PIN component; and
configuring, by the computing device, the secure memory associated with the computing device using the secure memory PIN.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods can secure personal identification numbers associated with secure elements within mobile devices. A host application of the mobile device can receive a personal identification number (PIN) or user PIN from a user. The application can generate one or more random PIN components. The application can compute a PIN for the secure element based upon the user PIN and each of the one or more random components. The SE can be configured using the PIN computed for the secure element. Each of the one or more random components may be stored in one or more distinct, diverse locations. In addition to entering the correct user PIN, each of the one or more random components must be retrieved from the diverse locations in order to reconstruct the PIN for the secure element whenever performing a transaction using the secure element.
94 Citations
20 Claims
-
1. A computer-implemented method for securing personal identification numbers, the method comprising:
-
receiving, by a computing device and from a user of the computing device, a user personal identification number (PIN) for a secure memory associated with the computing device; generating, by the computing device, at least one random PIN component; storing, by the computing device, the at least one random PIN component in at least one distinct location, wherein the at least one distinct location comprises a host memory of the computing device. determining, by the computing device, a secure memory PIN based at least in part on the user PIN and the at least one random PIN component; and configuring, by the computing device, the secure memory associated with the computing device using the secure memory PIN. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product, comprising:
a non-transitory computer-readable medium having computer-readable program instructions embodied therein that when executed by a computing device cause the computing device to secure personal identification numbers, the computer-readable instructions comprising; computer-readable program instructions for generating at least one random user personal identification number (PIN) components; computer-readable program instructions for storing the at least one random PIN components in at least one distinct location, wherein the at least one distinct location comprises a host memory. computer-readable program instructions for determining a secure memory PIN based at least in part on a user PIN and the at least one random PIN component; and computer-readable program instructions for configuring a secure memory using the secure memory PIN. - View Dependent Claims (12, 13, 14, 15, 16)
-
17. A system for securing personal identification numbers, the system comprising:
-
a storage medium; and a processor communicatively coupled to the storage medium, wherein the processor executes application code instructions that are stored in the storage medium and that cause the system to; generate at least one random personal identification number (PIN) components; store the at least one random PIN components in at least one distinct location; determine a secure memory PIN based at least in part on a user PIN and the at least one random PIN component; and configure a secure memory using the secure memory PIN. - View Dependent Claims (18, 19, 20)
-
Specification