METHODS AND SYSTEMS OF INCREASING SECURITY QUALITY OF COMPUTING -DEVICE COMMUNICATIONS
First Claim
1. A method of increasing security of computing-device mobile device communications comprising executing on one or more processors in a central repository server the steps of:
- obtaining a first user'"'"'s public key, wherein the first user'"'"'s public key is one of a pair of certification keys generated by an application in a first user'"'"'s computing device;
obtaining, from the first user via the first user'"'"'s computing device, a set of first user'"'"'s communication identifiers, and wherein the set of first user'"'"'s communication identifier comprises a first user'"'"'s mobile device number, a first user'"'"'s email address, or a first user'"'"'s online social network identifier;
receiving a set of first user'"'"'s communication identifiers from the first user via the first user'"'"'s computing device;
generating one or more associations of the first user'"'"'s public key with the set of first user'"'"'s communication identifiers;
with the one or more processors in the central repository server implementing delivery of the first user'"'"'s public key to a second user'"'"'s mobile device;
receiving, from another application operating in the second user'"'"'s mobile device, a request for the first user'"'"'s public key, wherein the request comprises at least one of the first user'"'"'s communication identifiers;
retrieving the first user'"'"'s public key, the set of first user'"'"'s communication identifiers, and the association of the first user'"'"'s public key with the set of first user'"'"'s communication identifiers from the computer data store;
authenticating that the at least one of the first user'"'"'s communication identifiers received from the other application is associated with the first user'"'"'s public key using the retrieved associations of the first user'"'"'s public key with the set of first user'"'"'s communication identifiers from the computer data store; and
communicating the first user'"'"'s public key to the other application operating in the second user'"'"'s mobile device.
0 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, method of increasing security of computing-device mobile device communications comprising executing on one or more processors in a central repository server the step of obtaining a first user'"'"'s public key. The first user'"'"'s public key is one of a pair of certification keys generated by an application in a first user'"'"'s computing device. The method includes the step of obtaining, from the first user via the first user'"'"'s computing device, a set of first user'"'"'s communication identifiers. The set of first user'"'"'s communication identifier includes a first user'"'"'s mobile device number, a first user'"'"'s email address, or a first user'"'"'s online social network identifier. The method includes the step of receiving a set of first user'"'"'s communication identifiers from the first user via the first user'"'"'s computing device. The method includes the step of generating one or more associations of the first user'"'"'s public key with the set of first user'"'"'s communication identifiers. With the one or more processors in the central repository server implementing delivery of the first user'"'"'s public key to a second user'"'"'s mobile device the method receives from another application operating in the second user'"'"'s mobile device, a request for the first user'"'"'s public key. The request includes at least one of the first user'"'"'s communication identifiers. The method includes the step of retrieving the first user'"'"'s public key, the set of first user'"'"'s communication identifiers, and the association of the first user'"'"'s public key with the set of first user'"'"'s communication identifiers from the computer data store. The method includes the step of authenticating that the at least one of the first user'"'"'s communication identifiers received from the other application is associated with the first user'"'"'s public key using the retrieved associations of the first user'"'"'s public key with the set of first user'"'"'s communication identifiers from the computer data store. The method includes the step of communicating the first user'"'"'s public key to the other application operating in the second user'"'"'s mobile device.
4 Citations
16 Claims
-
1. A method of increasing security of computing-device mobile device communications comprising executing on one or more processors in a central repository server the steps of:
-
obtaining a first user'"'"'s public key, wherein the first user'"'"'s public key is one of a pair of certification keys generated by an application in a first user'"'"'s computing device; obtaining, from the first user via the first user'"'"'s computing device, a set of first user'"'"'s communication identifiers, and wherein the set of first user'"'"'s communication identifier comprises a first user'"'"'s mobile device number, a first user'"'"'s email address, or a first user'"'"'s online social network identifier; receiving a set of first user'"'"'s communication identifiers from the first user via the first user'"'"'s computing device; generating one or more associations of the first user'"'"'s public key with the set of first user'"'"'s communication identifiers; with the one or more processors in the central repository server implementing delivery of the first user'"'"'s public key to a second user'"'"'s mobile device; receiving, from another application operating in the second user'"'"'s mobile device, a request for the first user'"'"'s public key, wherein the request comprises at least one of the first user'"'"'s communication identifiers; retrieving the first user'"'"'s public key, the set of first user'"'"'s communication identifiers, and the association of the first user'"'"'s public key with the set of first user'"'"'s communication identifiers from the computer data store; authenticating that the at least one of the first user'"'"'s communication identifiers received from the other application is associated with the first user'"'"'s public key using the retrieved associations of the first user'"'"'s public key with the set of first user'"'"'s communication identifiers from the computer data store; and communicating the first user'"'"'s public key to the other application operating in the second user'"'"'s mobile device. - View Dependent Claims (2)
-
-
3. A computer-implemented method comprising:
-
with a mobile-device application operating in a mobile device managed by a first user, creating a pair of certification keys, wherein the pair of certification keys comprises a first user'"'"'s public key; providing the first user'"'"'s public key to a central repository server; with the central repository server; associating the public key with the mobile-device application; receiving from the first user a set of first user'"'"'s communication identifiers; authenticating the first user and the set of first user'"'"'s communication identifiers with a multifactor user-identification authentication operation; using at least one communication identifier to confirm a first user'"'"'s identity; associate the set of first user'"'"'s communication identifiers with the first user'"'"'s public key; receiving, from another application operating in a second user'"'"'s mobile device, a request for the first user'"'"'s public key, wherein the request comprises an authenticated first user'"'"'s communication identifier; authenticating the communication identifier received from the other application as associated with the first user'"'"'s public key; certifying to the other application that the communication identifier received from the other application is associated with the first user'"'"'s public key; and communicating the first user'"'"'s public key to the other application operating in the second user'"'"'s mobile device. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification