×

Secure configuration of mobile applications

  • US 9,075,978 B2
  • Filed: 04/23/2012
  • Issued: 07/07/2015
  • Est. Priority Date: 04/23/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method performed on a mobile computing device comprising:

  • generating, by a server system, configuration data for a first mobile application, wherein the configuration data includes data security encryption and decryption keys;

    generating, by the server system a challenge code, and the mobile computing device receiving from the server system a server-generated challenge code via a user interface;

    generating, by the server system a verification value using the challenge code and the configuration data, wherein the configuration data and the challenge code are encrypted and the resulting ciphers are combined;

    receiving, by the mobile computing device from the server system, a first communication that includes configuration data and verification data different from the server-originated configuration data, wherein the verification data is generated from a combination of the configuration data and the server-generated challenge code, wherein the first communication comprises an email message having an attachment, and wherein the attachment comprises the configuration data and the verification data;

    executing, for a user, the first mobile application and displaying an input box allowing the user to enter the challenge code previously provided to the user;

    receiving, by the mobile computing device from the user of the mobile computing device, a user-provided challenge code, wherein the user receives the user-provided challenge code over a trusted communication channel different from a communication channel over which the mobile computing device receives the first communication;

    verifying, by the mobile computing device, the authenticity of the configuration data received from the first communication using the user-provided challenge code, wherein verifying includes generating a candidate verification value from a combination of the configuration data and the user-provided challenge code and comparing the candidate verification value with the verification data received in the first communication, wherein the configuration data is deemed verified when the verification data received in the first communication matches the candidate verification value; and

    when the configuration data is deemed verified, then configuring, by the mobile computing device, the first mobile application using the configuration data.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×