×

TOOL FOR CREATING A SYSTEM HARDWARE SIGNATURE FOR PAYMENT AUTHENTICATION

  • US 20160048834A1
  • Filed: 08/12/2014
  • Published: 02/18/2016
  • Est. Priority Date: 08/12/2014
  • Status: Active Grant
First Claim
Patent Images

1. A system for payment authentication using a system hardware signature, whereby presence of malware may be detected prior to payment information being compromised, the system comprising:

  • a computer apparatus including a processor and a memory; and

    a software module stored in the memory, comprising executable instructions that when executed by the processor cause the processor to;

    create a unique signature, using a signature creation algorithm and based at least in part on a hardware profile of the system, comprising;

    obtaining first information identifying a first part of the computer apparatus;

    obtaining second information identifying a second part of the computer apparatus;

    obtaining third information identifying the computer apparatus;

    obtaining fourth information related to a current time and/or a current date;

    obtaining fifth information corresponding to a software execution pattern;

    combining the first information, the second information, the third information, the fourth information and the fifth information to create the unique signature;

    receive a request, from a user, to perform a transaction using the system;

    in response to receiving the request, determining whether any application or system has accessed the hardware profile, comprising;

    if not, determining that the signature creation algorithm has not been compromised; and

    if so, determining that the application or system that accessed the hardware profile was authorized to access the hardware profile and thereby determining that the signature creation algorithm has not been compromised;

    in response to determining that the signature creation algorithm has not been compromised, create a key based on the unique signature, wherein the key is different from the unique signature;

    initiate display of the key to the user;

    receive user input entered in response to the user viewing the key; and

    determine whether to proceed with transaction payment authentication based at least on whether the received user input matches the created key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×