×

Tool for creating a system hardware signature for payment authentication

  • US 9,824,356 B2
  • Filed: 08/12/2014
  • Issued: 11/21/2017
  • Est. Priority Date: 08/12/2014
  • Status: Active Grant
First Claim
Patent Images

1. A mobile device configured for transaction authentication using a device hardware signature, whereby presence of malware may be detected prior to payment information being compromised, the mobile device comprising:

  • a processor, a display; and

    a memory storing computer executable instructions that when executed by the processor cause the processor to;

    create a unique signature, using a signature creation algorithm and based at least in part on a hardware profile of the mobile device, wherein;

    the hardware profile of the mobile device comprises;

    first information identifying a first part of the mobile device;

    second information identifying a second part of the mobile device;

    third information identifying the mobile device; and

    fourth information corresponding to a software execution pattern, wherein the fourth information is determined based on monitoring authorized software programs and applications of the mobile device;

    creating the unique signature further comprises;

    obtaining fifth information related to a current time and/or a current date; and

    combining at least a portion of the hardware profile of the mobile device and the fifth information to create the unique signature;

    receive, at the mobile device, a user transaction trigger from a transaction terminal;

    determine that malware has not compromised the signature creation algorithm associated with the created unique signature, in response to receiving the user transaction trigger from the transaction terminal, the determining comprising;

    monitoring whether any application or system has accessed the hardware profile of the mobile device; and

    determining that the signature creation algorithm has not been compromised based on (i) determining that the hardware profile was not accessed by any application or system, or (ii) determining that the application or system that accessed the hardware profile was authorized to access the hardware profile;

    wherein the executable instructions further cause the processor to create a key, based on the unique signature, in response to determining that the signature creation algorithm has not been compromised;

    initiate, on the display, a presentation of the key associated with the unique signature;

    receive user input entered in response to the user viewing the key;

    determine that the received user input matches the created key; and

    transmit, via an operative communication channel between the mobile device and the transaction terminal, a notification to the transaction terminal associated with the user transaction trigger, the notification indicating successful authentication of the user when the received user input matches that created key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×