Automatic compromise detection for hardware signature for payment authentication
First Claim
1. A system for automatic compromise detection of a hardware signature authentication algorithm, the system comprising:
- a computer apparatus including a processor and a memory; and
a software module stored in the memory, comprising executable instructions that when executed by the processor cause the processor to;
create a unique signature, using a signature creation algorithm, based at least in part on a hardware profile of the system;
receive a request, from a user, to perform a transaction using the system;
in response to receiving the request, determine whether malware has compromised the signature creation algorithm; and
if so, preventing the signature creation algorithm from creating a key based on the unique signature; and
if not, allowing the signature creation algorithm to create a key based on the unique signature.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide a method a authenticating a transaction at the point of transaction. In some embodiments of the invention, a unique signature is created based at least in part on a hardware profile of the system. In some embodiments, a request is received from a user to perform a transaction using the system. In some embodiments, in response to receiving the request the system may determine whether malware has compromised the signature creation algorithm, and if so, prevent the signature creation algorithm from creating a key based on the unique signature. Alternatively, if not, the system may allow the signature creation algorithm to create a key based on the unique signature.
-
Citations
20 Claims
-
1. A system for automatic compromise detection of a hardware signature authentication algorithm, the system comprising:
-
a computer apparatus including a processor and a memory; and a software module stored in the memory, comprising executable instructions that when executed by the processor cause the processor to; create a unique signature, using a signature creation algorithm, based at least in part on a hardware profile of the system; receive a request, from a user, to perform a transaction using the system; in response to receiving the request, determine whether malware has compromised the signature creation algorithm; and if so, preventing the signature creation algorithm from creating a key based on the unique signature; and if not, allowing the signature creation algorithm to create a key based on the unique signature. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for providing automatic compromise detection of a hardware signature authentication algorithm, the computer program product comprising:
-
a non-transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising; computer readable program code configured to create a unique signature, using a signature creation algorithm, based at least in part on a hardware profile of the system; computer readable program code configured to receive a request, from a user, to perform a transaction using the system; computer readable program code configured to in response to receiving the request, determine whether malware has compromised the signature creation algorithm; and if so, preventing the signature creation algorithm from creating a key based on the unique signature; and if not, allowing the signature creation algorithm to create a key based on the unique signature. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method for providing automatic compromise detection of a hardware signature authentication algorithm, the method comprising:
-
creating, via a computing device processor, a unique signature, using a signature creation algorithm, based at least in part on a hardware profile of the system; receiving, via a computing device processor, a request, from a user, to perform a transaction using the system; in response to receiving the request, determining, via a computing device processor, whether malware has compromised the signature creation algorithm; and if so, preventing, via a computing device processor the signature creation algorithm from creating a key based on the unique signature; and if not, allowing, via a computing device processor, the signature creation algorithm to create a key based on the unique signature. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification