Mobile banking
First Claim
1. An apparatus for verifying end-to-end secure wireless data transmission from a wireless device comprising a software compliant with a wireless protocol to a server, where the data transmission travels through a gateway configured to receive the data transmission from the wireless device, the apparatus comprising:
- a processor; and
memory storing computer-readable instructions that when executed by the processor cause the apparatus to perform a method comprising;
identifying a value of a first identifier, associated with the data transmission, corresponding to the wireless device;
identifying a value of a second identifier, associated with the data transmission, corresponding to the gateway; and
determining whether the data transmission is end-to-end secure from the wireless device to the server, including comparing the value of the first identifier to a first list of approved values, and comparing the value of the second identifier to a second list of approved values;
where the comparing the value of the first identifier includes;
comparing the value of the first identifier with the first list of approved values to determine that an exact match does not exist;
identifying a portion of the value of the first identifier and comparing the portion with the first list of approved values to determine that a loose match does not exist; and
reducing the portion in size by a predetermined amount and comparing the reduced portion of the first identifier with the first list of approved values to determine that a loose match does exist.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for identifying circumstances where end-to-end security is not available to a mobile banking customer. The user may be alerted/warned or restricted from accessing some banking services through his/her WAP-enabled mobile device if the server (e.g., bank server) determines that end-to-end security is not available. In some instances, the bank server may access a computer data file containing a list of known end-to-end secure devices and gateways to verify the integrity of the data communication. The server may verify the integrity of the data communication using loose matching.
21 Citations
16 Claims
-
1. An apparatus for verifying end-to-end secure wireless data transmission from a wireless device comprising a software compliant with a wireless protocol to a server, where the data transmission travels through a gateway configured to receive the data transmission from the wireless device, the apparatus comprising:
-
a processor; and memory storing computer-readable instructions that when executed by the processor cause the apparatus to perform a method comprising; identifying a value of a first identifier, associated with the data transmission, corresponding to the wireless device; identifying a value of a second identifier, associated with the data transmission, corresponding to the gateway; and determining whether the data transmission is end-to-end secure from the wireless device to the server, including comparing the value of the first identifier to a first list of approved values, and comparing the value of the second identifier to a second list of approved values; where the comparing the value of the first identifier includes; comparing the value of the first identifier with the first list of approved values to determine that an exact match does not exist; identifying a portion of the value of the first identifier and comparing the portion with the first list of approved values to determine that a loose match does not exist; and reducing the portion in size by a predetermined amount and comparing the reduced portion of the first identifier with the first list of approved values to determine that a loose match does exist. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for determining whether communication from a wireless device comprising a software compliant with a wireless protocol to a server is end-to-end secure, where the data transmission travels through a gateway configured to receive the data transmission from the wireless device, the method comprising:
-
identifying, using a processor, a value of a first identifier, associated with the data transmission, corresponding to the wireless device; identifying, using the processor, a value of a second identifier, associated with the data transmission, corresponding to the gateway; and determining, using the processor, whether the data transmission is end-to-end secure from the wireless device to the server, including comparing the value of the first identifier to a first list of approved values, and comparing the value of the second identifier to a second list of approved values; where the comparing the value of the first identifier includes; comparing the value of the first identifier with the first list of approved values to determine that an exact match does not exist; identifying a portion of the value of the first identifier and comparing the portion with the first list of approved values to determine that a loose match does not exist; and reducing the portion in size by a predetermined amount and comparing the reduced portion of the first identifier with the first list of approved values to determine that a loose match does exist. - View Dependent Claims (14, 15, 16)
-
Specification