×

System and method for bidirectional trust between downloaded applications and mobile devices including a secure charger and malware scanner

  • US 9,092,626 B2
  • Filed: 05/07/2013
  • Issued: 07/28/2015
  • Est. Priority Date: 11/09/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computer-based method for determining if a computer-based application downloaded by an electronic device can trust the electronic device is authorized to receive the downloaded computer-based application, comprising the steps of:

  • (a) connecting a scanning device to the electronic device for scanning for malware and the scanning device receiving scan results that indicate whether the electronic device is compromised by having malware thereon or not compromised by being free of malware, and the scanning device storing the scanning results thereon, with the scanning device determining at least one computer-based application downloaded to the electronic device and the electronic device identification information;

    (b) the scanning device establishing a secure connection with an internal network that is remote from the scanning device, and reporting the scan results and the electronic device identification information to the internal network;

    (c) the internal network storing the scan results and electronic device identification information in a network database and associating therewith application publisher information for the at least one computer-based application downloaded to the electronic device;

    (d) the internal network generating a service key related to the at least one computer- based application and storing the service key with the application publisher information in the network database and sending the service key to the application publisher remote from the internal network;

    (e) the at least one computer-based application identified in step (a) establishing a connection from the electronic device to an application publisher using a wireless connection established through the electronic device and transmitting at least login information, a request to login to the application by the electronic device, the electronic device identification information, and a request for verification information to be sent to the internal network;

    (f) the application publisher establishing a connection with the internal network and transmitting verification information to the internal network, with the verification information including at least the electronic device identification information and service key;

    (g) the internal network receiving the verification information and comparing the verification information with the electronic device identification information and service key stored in the network database, and if the verification information matches then step (i) and if the verification information other than matches then step (h);

    (h) the internal network transmits to the application publisher that a verification process ends because the electronic device identification information or service key other than matches electronic device identification based information or service key stored in the network database;

    (i) the internal network transmitting to the application publisher a status of the electronic device based on scan results which includes at least the electronic device is compromised if the electronic device includes at least malware thereon or not compromised if the electronic device does not include at least malware thereon; and

    (j) the publisher granting or denying the login request by the electronic device based on the status transmitted by the internal network to the publisher at step (i).

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×