Device notarization
First Claim
1. A method comprising:
- generating a first concatenated value at a client device, during notarization of the client device to use an application, wherein the generating comprises concatenating a first device tamper (DT) value and a first application tamper (AT) value; and
generating a first transaction data signature (TDS) at the client device, wherein the generating of the first TDS comprises applying the first concatenated value to an authentication generation (AG) module, wherein the first DT value is generated by running a DT check on the client device and the first AT value is generated by running an AT check on the application, and the first DT value and the first AT value each comprise a hash value.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for device notarization and verification are provided. In one implementation, various integrity values are concatenated to generate a concatenated value that is used to generate a transaction data signature (TDS). In one implementation, the concatenated value is a concatenation of a device value, an application value, an application encryption (AE) module value, and an authentication generation (AG) module value. The TDS or notarization code is generated by applying the concatenated value to the AG module. In one implementation, subsequent use of the application on the device involves generation of a new TDS, which is compared against the notarization code to determine whether use of the application on the device is authorized. In one implementation, the AE module and the AG module are seeded with a seed value which includes a device value, an application value, a user specific value, and a pseudo random number.
32 Citations
18 Claims
-
1. A method comprising:
-
generating a first concatenated value at a client device, during notarization of the client device to use an application, wherein the generating comprises concatenating a first device tamper (DT) value and a first application tamper (AT) value; and generating a first transaction data signature (TDS) at the client device, wherein the generating of the first TDS comprises applying the first concatenated value to an authentication generation (AG) module, wherein the first DT value is generated by running a DT check on the client device and the first AT value is generated by running an AT check on the application, and the first DT value and the first AT value each comprise a hash value. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
receiving a first transaction data signature (TDS) at a server, wherein the first TDS is generated during notarization of a client device to use an application at the client device by applying a first concatenated value to an authentication generation (AG) module, wherein the first concatenated value comprises a first device tamper (DT) value, a first application tamper (AT) value, a first application encryption (AE) value and a first AG value, wherein the DT and AT values each comprise a hash value; receiving the first concatenated value at the server; generating, at the server, a second TDS by using the first concatenated value; and comparing the first TDS and the second TDS. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium including computer executable code, which, when executed on a computer, cause the computer to perform a method comprising:
-
generating a first concatenated value at a client device during notarization of the client device to use an application, wherein the generating comprises concatenating a first device tamper (DT) value generated by running a DT check on the client device with a first application tamper (AT) value generated by running an AT check on the application, wherein the first DT value and the first AT value comprise hash values; and generating a first transaction data signature (TDS) at the client device, wherein the generating of the first TDS comprises applying the first concatenated value to an authentication generation (AG) module. - View Dependent Claims (16, 17, 18)
-
Specification