Dynamically reacting policies and protections for securing mobile financial transactions
First Claim
Patent Images
1. A computer implemented method comprising:
- receiving, by a trust mediator included in an issuer network and having a processor, a list of protection methods from a first external terminal over a communication network, wherein the list of protection methods includes protection methods available to the first external terminal;
matching, by the trust mediator, each of the protection methods in the received list of protection methods to a corresponding protection method in a master list of protection methods stored in a protection method database, wherein the master list of protection methods includes category information and strength information corresponding to each protection method;
creating, by the trust mediator, a matrix of protection methods based on at least one of the matched protection methods, the matrix including a plurality of dimensions corresponding to a plurality of categories, respectively, wherein the protection methods are arranged in the matrix based on the category information, and, within each dimension, the protection methods are arranged based on the strength information;
assigning, by the trust mediator, a first index level to a first protection method in the matrix, and a second index level to a second protection method in the matrix;
receiving, by the trust mediator, security-related information from one or more trust mediator agents over the communication network, wherein the security-related information indicates that the first protection method is invalid;
increasing, by the trust mediator and in response to the receiving the security-related information, a threshold index level;
performing, by the trust mediator, a database lookup using an external terminal identifier for the first external terminal;
retrieving, by the trust mediator and based on the external terminal identifier, rules corresponding to the received security-related information from a master list of rules;
selecting, by the trust mediator, at least one protection method from the matrix of protection methods based on the rules obtained by the retrieving, the category information, the strength information, and the second index level, wherein the second index level is greater than the threshold index level; and
transmitting, by the trust mediator, the at least one selected protection method to a trust mediator agent to complete a financial transaction.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure mobile financial transaction is provided by receiving a list of protection methods from an external terminal over a communication network. A matrix of protection methods corresponding to the external terminal is created based on the identified protection methods. Security-related information is received from one or more trust mediator agents over the communication network. Rules corresponding to the received security related information are retrieved, and at least one protection method is selected from the matrix of protection methods based on the retrieved rules. The selected protection method is transmitted to the trust mediator agents for implementation.
128 Citations
18 Claims
-
1. A computer implemented method comprising:
-
receiving, by a trust mediator included in an issuer network and having a processor, a list of protection methods from a first external terminal over a communication network, wherein the list of protection methods includes protection methods available to the first external terminal; matching, by the trust mediator, each of the protection methods in the received list of protection methods to a corresponding protection method in a master list of protection methods stored in a protection method database, wherein the master list of protection methods includes category information and strength information corresponding to each protection method; creating, by the trust mediator, a matrix of protection methods based on at least one of the matched protection methods, the matrix including a plurality of dimensions corresponding to a plurality of categories, respectively, wherein the protection methods are arranged in the matrix based on the category information, and, within each dimension, the protection methods are arranged based on the strength information; assigning, by the trust mediator, a first index level to a first protection method in the matrix, and a second index level to a second protection method in the matrix; receiving, by the trust mediator, security-related information from one or more trust mediator agents over the communication network, wherein the security-related information indicates that the first protection method is invalid; increasing, by the trust mediator and in response to the receiving the security-related information, a threshold index level; performing, by the trust mediator, a database lookup using an external terminal identifier for the first external terminal; retrieving, by the trust mediator and based on the external terminal identifier, rules corresponding to the received security-related information from a master list of rules; selecting, by the trust mediator, at least one protection method from the matrix of protection methods based on the rules obtained by the retrieving, the category information, the strength information, and the second index level, wherein the second index level is greater than the threshold index level; and transmitting, by the trust mediator, the at least one selected protection method to a trust mediator agent to complete a financial transaction. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system comprising:
a trust mediator including a processor coupled to a memory, operable to; receive a list of protection methods from a first external terminal over a communication network, wherein the list of protection methods includes protection methods available to the first external terminal; match each of the protection methods in the received list of protection methods to a corresponding protection method in a master list of protection methods stored in a protection method database, wherein the master list of protection methods includes category information and strength information corresponding to each protection method; create a matrix of protection methods based on at least one of the matched protection methods, the matrix including a plurality of dimensions corresponding to a plurality of categories, respectively, wherein the protection methods are arranged in the matrix based on the category information, and, within each dimension, the protection methods are arranged based on the strength information; assign a first index level to a first protection method in the matrix, and a second index level to a second protection method in the matrix; receive security-related information from one or more trust mediator agents over the communication network, wherein the security-related information indicates that the first protection method is invalid; increase, in response to the receiving the security-related information, a threshold index level; perform a database lookup using an external terminal identifier for the first external terminal; retrieve, based on the external terminal identifier and from a master list of rules stored in the memory, rules corresponding to the received security-related information; select at least one protection method from the matrix of protection methods based on the rules obtained by the retrieving, the category information, the strength information, and the second index level, wherein the second index level is greater than the threshold index level; and transmit the at least one selected protection method to a trust mediator agent to complete a financial transaction. - View Dependent Claims (7, 8, 9, 10)
-
11. A non-transitory computer-readable medium having stored thereon sequences of instructions, the sequences of instructions including instructions, which, when executed by a computer system, cause the computer system to:
-
receive, by a trust mediator included in an issuer network and having a processor, a list of protection methods from a first external terminal over a communication network, wherein the list of protection methods includes protection methods available to the first external terminal; match, by the trust mediator, each of the protection methods in the received list of protection methods to a corresponding protection method in a master list of protection methods stored in a protection method database, wherein the master list of protection methods includes category information and strength information corresponding to each protection method; create, by the trust mediator, a matrix of protection methods based on at least one of the matched protection methods, the matrix including a plurality of dimensions corresponding to a plurality of categories, respectively, wherein the protection methods are arranged in the matrix based on the category information, and, within each dimension, the protection methods are arranged based on the strength information; assign, by the trust mediator, a first index level to a first protection method in the matrix, and a second index level to a second protection method in the matrix; receive, by the trust mediator, security-related information comprising an external terminal identifier for the first external terminal from one or more trust mediator agents over the communication network, wherein the security-related information indicates that the first protection method is invalid; increase, by the trust mediator and in response to the receiving the security-related information, a threshold index level; perform, by the trust mediator, a database lookup using the external terminal identifier; retrieve, by the trust mediator and based on the external terminal identifier, rules corresponding to the received security-related information from a master list of rules; select, by the trust mediator, at least one protection method from the matrix of protection methods based on the rules obtained by the retrieving, the category information, the strength information, and the second index level, wherein the second index level is greater than the threshold index level; and transmit, by the trust mediator, the at least one selected protection method to a trust mediator agent to complete a financial transaction. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method comprising:
-
transmitting, by an external terminal including a processor, security-related information comprising an external terminal identifier for the external terminal to a trust mediator over a communication network, the security-related information including sensor data received from a plurality of sensors, the trust mediator being included in an issuer network, wherein the security-related information indicates that a first protection method is invalid; wherein the trust mediator performs a database lookup using the external terminal identifier; wherein the trust mediator retrieves, based on the external terminal identifier, rules corresponding to the received security-related information from a master list of rules stored in a protection method database; receiving, by the external terminal and in response to the transmitting of the security-related information, at least one protection method from the trust mediator for implementation, the at least one protection method being selected from a matrix of protection methods including the first protection method and a second protection method, the matrix of protection methods being created based on a list of protection methods available to an external terminal and included in a master list of protection methods, wherein the master list of protection methods includes category information and strength information corresponding to each protection method, the matrix including a plurality of dimensions corresponding to a plurality of categories, respectively, wherein the protection methods are arranged in the matrix based on the category information, and, within each dimension, the protection methods are arranged based on the strength information; wherein the trust mediator assigns a first index level to the first protection method in the matrix, and a second index level to a second protection method in the matrix; wherein the trust mediator increases a threshold index level based on the security-related information; and completing, by the external terminal, a financial transaction by using the at least one received protection method.
-
-
17. A system comprising:
an external terminal including a processor coupled to a memory, operable to; transmit security-related information comprising an external terminal identifier for the external terminal to a trust mediator over a communication network, the security-related information including sensor data received from a plurality of sensors, wherein the security-related information indicates that a first protection method is invalid; wherein the trust mediator performs a database lookup using the external terminal identifier; wherein the trust mediator retrieves, based on the external terminal identifier, rules corresponding to the received security-related information from a master list of rules stored in a protection method database; receive, in response to the transmitting of the security-related information, at least one protection method from the trust mediator, the at least one protection method being selected from a matrix of protection methods including the first protection method and a second protection method, the matrix of protection methods being created based on a list of protection methods available to an external terminal and included in a master list of protection methods, wherein the master list of protection methods includes category information and strength information corresponding to each protection method, the matrix including a plurality of dimensions corresponding to a plurality of categories, respectively, wherein the protection methods are arranged in the matrix based on the category information, and, within each dimension, the protection methods are arranged based on the strength information; wherein the trust mediator assigns a first index level to a first protection method in the matrix, and a second index level to a second protection method in the matrix; wherein the trust mediator increases a threshold index level based on the security-related information; and complete a financial transaction by using the at least one received protection method.
-
18. A non-transitory computer-readable medium having stored thereon sequences of instructions, the sequences of instructions including instructions, which, when executed by a computer system, cause the computer system to:
-
transmit, by an external terminal including a processor, security-related information comprising an external terminal identifier for the external terminal to a trust mediator over a communication network, the security-related information including sensor data received from a plurality of sensors, wherein the security-related information indicates that a first protection method is invalid; wherein the trust mediator performs a database lookup using the external terminal identifier; wherein the trust mediator retrieves, based on the external terminal identifier, rules corresponding to the received security-related information from a master list of rules stored in a protection method database; receiving, by the external terminal and in response to the transmitting of the security-related information, at least one protection method from the trust mediator, the at least one protection method being selected from a matrix of protection methods including the first protection method and a second protection method, the matrix of protection methods being created based on a list of protection methods available to an external terminal and included in a master list of protection methods, wherein the master list of protection methods includes category information and strength information corresponding to each protection method, the matrix including a plurality of dimensions corresponding to a plurality of categories, respectively, wherein the protection methods are arranged in the matrix based on the category information, and, within each dimension, the protection methods are arranged based on the strength information; wherein the trust mediator assigns a first index level to a first protection method in the matrix, and a second index level to a second protection method in the matrix; wherein the trust mediator increases a threshold index level based on the security-related information; and completing, by the external terminal, a financial transaction by using the at least one received protection method.
-
Specification