Secure digital communications
First Claim
Patent Images
1. A method for secure mobile wallet communications, the method comprising:
- using one or more processors;
executing a first mobile wallet application;
authenticating a message received from a second mobile wallet application by;
comparing a calculated hash of the message to a hash value contained in the message, the hash value contained in the message being in an encrypted form;
responsive to determining that the calculated hash of the message matches the hash value contained in the message;
sending a challenge to the second mobile wallet application, the challenge requesting financial account information from the second mobile wallet application about a user of the first mobile wallet application;
receiving a challenge-response;
determining whether the challenge-response includes a correct answer to the challenge;
responsive to determining that the challenge-response includes the correct answer, marking the message from the second mobile wallet application as authenticated; and
responsive to authenticating the message, engaging in a financial transaction with the second mobile wallet application.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed in some examples are methods, systems, and machine readable mediums for secure end-to-end digital communications involving mobile wallets. The result is direct, secure, in-band messaging using mobile wallets that may be used to send messages such as payments, requests for money, financial information, or messages to authorize a debit or credit.
92 Citations
17 Claims
-
1. A method for secure mobile wallet communications, the method comprising:
-
using one or more processors; executing a first mobile wallet application; authenticating a message received from a second mobile wallet application by; comparing a calculated hash of the message to a hash value contained in the message, the hash value contained in the message being in an encrypted form; responsive to determining that the calculated hash of the message matches the hash value contained in the message; sending a challenge to the second mobile wallet application, the challenge requesting financial account information from the second mobile wallet application about a user of the first mobile wallet application; receiving a challenge-response; determining whether the challenge-response includes a correct answer to the challenge; responsive to determining that the challenge-response includes the correct answer, marking the message from the second mobile wallet application as authenticated; and responsive to authenticating the message, engaging in a financial transaction with the second mobile wallet application. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A device for secure mobile wallet communications, the device comprising:
-
one or more processors executing a first mobile wallet application, the first mobile wallet application configured to perform operations comprising; authenticating a message received from a second mobile wallet application by; comparing a calculated hash of the message to a hash value contained in the message, the hash value contained in the message being in an encrypted form; responsive to determining that the calculated hash of the message matches the hash value contained in the message; sending a challenge to the second mobile wallet application, the challenge requesting financial account information from the second mobile wallet application about a user of the first mobile wallet application; receiving a challenge-response; determining whether the challenge-response includes a correct answer to the challenge; responsive to determining that the challenge-response includes the correct answer, marking the message from the second mobile wallet application as authenticated; and responsive to authenticating the message, engaging in a financial transaction with the second mobile wallet application. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory machine-readable medium storing instructions of a first mobile wallet application, the instructions when executed by a machine, causes the machine to perform operations comprising:
authenticating a message received from a second mobile wallet application by; comparing a calculated hash of the message to a hash value contained in the message, the hash value contained in the message being in an encrypted form; responsive to determining that the calculated hash of the message matches the hash value contained in the message; sending a challenge to the second mobile wallet application, the challenge requesting financial account information from the second mobile wallet application about a user of the first mobile wallet application; receiving a challenge-response; determining whether the challenge-response includes a correct answer to the challenge; responsive to determining that the challenge-response includes the correct answer, marking the message from the second mobile wallet application as authenticated; and responsive to authenticating the message, engaging in a financial transaction with the second mobile wallet application. - View Dependent Claims (14, 15, 16, 17)
Specification