×

Secure configuration of mobile application

  • US 9,331,995 B2
  • Filed: 04/22/2014
  • Issued: 05/03/2016
  • Est. Priority Date: 04/23/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method of configuring an application program of a mobile computing device, the method comprising:

  • establishing a secure network connection between the mobile computing device and a server computer system;

    authenticating a user of the mobile computing device against the server computer system via the secure network connection;

    receiving, at the server computer system, a configuration request via the secure network connection from the mobile computing device, the configuration request indicative of a user'"'"'s request for configuring the application program; and

    in response to receiving the configuration request;

    generating a challenge code;

    sending the challenge code via the secure network connection to the mobile computing device;

    encrypting configuration data using a symmetric key, wherein the symmetric key is the challenge code or the symmetric key is derived from the challenge code;

    sending the configuration data in encrypted form via the secured network connection to the mobile computing device; and

    sending a verification value from the server computer system to the mobile computing device either via an additional communication channel that is different from the secure network connection or as a separate communication over the same secure network connection, wherein the verification value is a hash-based message authentication code (HMAC) produced by applying a secure hash function to a combination of the configuration data with the challenge code,whereby the mobile computing device, in response to receiving the configuration data and the verification value, invokes a configuration program module to;

    prompt the user to enter a challenge code via a user interface;

    decrypt the configuration data in encrypted form upon entry of the challenge code via an input component of the mobile computing device;

    verify the configuration data using the challenge code entered by the user and the verification value received via the additional communication channel; and

    configure the application program using the configuration data in response to verification of the configuration data.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×