Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Methodology for identifying local/mobile client computing devices using a network based database containing records of hashed distinctive hardware, software, and user provided biometric makers for authorization of electronic transactions and right of entry to secure locations

a network based database and computing device technology, applied in the field of secure authorization of electronic transactions and/or a right of entry to secure locations, can solve the problem of no longer any opportunity to gain unauthorized access, and achieve the effect of enhancing the use of multi-factor authentication techniques and reducing the scale of fraudulent transactions

Inactive Publication Date: 2016-09-22
INVYSTA TECH GRP
View PDF9 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention aims to enhance security in accessing secure financial card / bank accounts, software applications, websites, and physical things. It does this by validating the identity of a local / mobile computing device being used to initiate the access or authorization request, and ensuring that the request is coming from a local / mobile computing device previously registered in the validation database and fully authorized for use by the rightful account owner. This invention provides a significant step forward in achieving security against fraudulent transactions.

Problems solved by technology

The inclusion of the identity of the local / mobile computing device into the authorization equation creates the requirement for inclusion of something physical into the access / authorization request and thus, there is no longer any opportunity to gain unauthorized access simply in a simply cyber fashion.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methodology for identifying local/mobile client computing devices using a network based database containing records of hashed distinctive hardware, software, and user provided biometric makers for authorization of electronic transactions and right of entry to secure locations
  • Methodology for identifying local/mobile client computing devices using a network based database containing records of hashed distinctive hardware, software, and user provided biometric makers for authorization of electronic transactions and right of entry to secure locations
  • Methodology for identifying local/mobile client computing devices using a network based database containing records of hashed distinctive hardware, software, and user provided biometric makers for authorization of electronic transactions and right of entry to secure locations

Examples

Experimental program
Comparison scheme
Effect test

embodiments

[0100]In a basic embodiment of this invention, the local / mobile computing device that generates a request for authorization or access becomes an authenticating factor in a multi-factor authentication process, and is considered in the process of authorizing a financial transaction or in approving access. This is accomplished by the rightful owner of the local / mobile computing device registering said device with a validation database created by this invention. By registering said local / mobile computing device with said validation database, the rightful owner is giving his consent and approval for the presence of this device to be considered in approving or denying the transaction.

[0101]Because said registered local / mobile computing device is now part of the authorization process, the rightful owner of the account has another layer of protection in insuring that compromised personal and / or financial data cannot alone be used in fraudulent transactions. This additional layer of security...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention consists of methods whereby local / mobile computing devices are registered by collecting a set of hardware and / or software distinctive identifiers to be saved in a validation database residing on a validation database server / Web server, such that the local / mobile computing device can be used as a digital hardware key for right of access and authorization of electronic transactions. This is done by comparing a regenerated set of hardware and / or software distinctive identifiers with those previously registered in the validation database in order to validate the identity of the local / mobile computing device. The invention consists of a first software program executing on a local / mobile computing device that generates the set of hashed and / or encrypted hardware and / or software distinctive identifiers and a second software program resident residing on a validation database server / Web server that manages the validation database.

Description

[0001]This application claims priority from provisional application No. 62 / 134,980, filed Mar. 18, 2015, the entire contents of which are herewith incorporated by reference.CROSS REFERENCE[0002]The present application is related to provisional application No. 61 / 414,679 filed Nov. 17, 2010, the disclosure of which is hereby incorporated by reference.FIELD OF INVENTION[0003]The invention relates to secure authorization of electronic transactions and / or a right of entry to access secure locations through a matching function of regenerated specified distinctive identifiers drawn from a local / mobile computing device to those specified distinctive identifiers previously registered in a validation database, in order to validate the identity of the local / mobile computing device.BACKGROUND[0004]In the cyber world we live in, the issue of security has risen to new heights of awareness and concern. This can range from the security of your financial and personal data to even issues of physical...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06G06Q20/38G06Q20/40G06F17/30
CPCH04L63/102G06F17/30371G06Q20/40G06Q20/382H04L63/083G06Q20/02G06Q20/1085G06Q20/40145G06Q20/409G06Q20/4097G06Q20/308H04L63/0861H04L2463/082
Inventor STREUTER, GARY WILLIAMPRICE, WILLIAM PAT
Owner INVYSTA TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products