×

Methods and systems for persistent cross-application mobile device identification

  • US 9,521,551 B2
  • Filed: 03/14/2013
  • Issued: 12/13/2016
  • Est. Priority Date: 03/22/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for identifying a mobile device, comprising:

  • designating a first secure memory space in a memory of a mobile device as a first sandbox for confining a first application;

    designating a second secure memory space in the memory of the mobile device as a second sandbox for confining a second application;

    executing the first application in the first sandbox, the first application restricted from accessing the second secure memory space;

    executing the second application in the second sandbox, the second application restricted from accessing the first secure memory space;

    partitioning off a section of the memory in the mobile device to be designated as a persistent shared storage controlled by a shared storage manager, wherein the persistent shared storage is accessible by a plurality of applications executing in their respective, confined sandboxes, wherein the plurality of applications include the first application executing in the first sandbox and the second application executing in the second sandbox;

    determining, with aid of a processor, whether a universal device identifier of the mobile device exists on the mobile device, wherein the universal device identifier uniquely identifies the mobile device and is used to track fraudulent activities associated with the mobile device across the plurality of applications executing in their respective, confined sandboxes in the memory of the mobile device;

    generating the universal device identifier on the mobile device in response to a determination that the universal device identifier does not exist on the mobile device;

    storing the universal device identifier in the persistent shared storage on the mobile device;

    creating a storage location identifier associated with the universal device identifier, wherein the storage location identifier is used to access the universal device identifier stored in the persistent shared storage;

    sharing the storage location identifier with the plurality of applications executing in their respective, confined sandboxes;

    receiving independent requests for the universal device identifier from each of the first application and the second application of the plurality of applications;

    retrieving the universal device identifier from the persistent shared storage;

    providing the same universal device identifier to the first application and the second application; and

    identifying a potential fraudulent transaction based at least partly on the universal device identifier.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×