Methodology for identifying local/mobile client computing devices using a network based database containing records of hashed distinctive hardware, software, and user provided biometric makers for authorization of electronic transactions and right of entry to secure locations

a network based database and computing device technology, applied in the field of secure authorization of electronic transactions and/or a right of entry to secure locations, can solve the problem of no longer any opportunity to gain unauthorized access, and achieve the effect of enhancing the use of multi-factor authentication techniques and reducing the scale of fraudulent transactions

Inactive Publication Date: 2016-09-22
INVYSTA TECH GRP
View PDF9 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0044]An intent of the present invention is to insert a local / mobile computing device, known and approved by the rightful owner of the account, as a digital hardware key into the approval process required for gaining access and authorization. This access may address secure financial card / bank accounts, software applications, websites and physical things among other opportunities. In essence, the present invention validates the identity of a local / mobile computing device being used to initiate the access or authorization request and insures that the request is coming from a local / mobile computing device previously registered in the validation database and fully authorized for said use by the rightful account owner. In other words, even if the hacker / criminal has an account owner's complete personal and financial data, including their password or a forced biometric marker, the access / authorization request will not be approved unless it is being initiated by the rightful account owners local / mobile computing device, which is registered in the validation database. This invention provides a huge step forward in achieving security by greatly enhancing the use of multi-factor authentication techniques to reduce the scale of fraudulent transactions.

Problems solved by technology

The inclusion of the identity of the local / mobile computing device into the authorization equation creates the requirement for inclusion of something physical into the access / authorization request and thus, there is no longer any opportunity to gain unauthorized access simply in a simply cyber fashion.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methodology for identifying local/mobile client computing devices using a network based database containing records of hashed distinctive hardware, software, and user provided biometric makers for authorization of electronic transactions and right of entry to secure locations
  • Methodology for identifying local/mobile client computing devices using a network based database containing records of hashed distinctive hardware, software, and user provided biometric makers for authorization of electronic transactions and right of entry to secure locations
  • Methodology for identifying local/mobile client computing devices using a network based database containing records of hashed distinctive hardware, software, and user provided biometric makers for authorization of electronic transactions and right of entry to secure locations

Examples

Experimental program
Comparison scheme
Effect test

embodiments

[0100]In a basic embodiment of this invention, the local / mobile computing device that generates a request for authorization or access becomes an authenticating factor in a multi-factor authentication process, and is considered in the process of authorizing a financial transaction or in approving access. This is accomplished by the rightful owner of the local / mobile computing device registering said device with a validation database created by this invention. By registering said local / mobile computing device with said validation database, the rightful owner is giving his consent and approval for the presence of this device to be considered in approving or denying the transaction.

[0101]Because said registered local / mobile computing device is now part of the authorization process, the rightful owner of the account has another layer of protection in insuring that compromised personal and / or financial data cannot alone be used in fraudulent transactions. This additional layer of security...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention consists of methods whereby local / mobile computing devices are registered by collecting a set of hardware and / or software distinctive identifiers to be saved in a validation database residing on a validation database server / Web server, such that the local / mobile computing device can be used as a digital hardware key for right of access and authorization of electronic transactions. This is done by comparing a regenerated set of hardware and / or software distinctive identifiers with those previously registered in the validation database in order to validate the identity of the local / mobile computing device. The invention consists of a first software program executing on a local / mobile computing device that generates the set of hashed and / or encrypted hardware and / or software distinctive identifiers and a second software program resident residing on a validation database server / Web server that manages the validation database.

Description

[0001]This application claims priority from provisional application No. 62 / 134,980, filed Mar. 18, 2015, the entire contents of which are herewith incorporated by reference.CROSS REFERENCE[0002]The present application is related to provisional application No. 61 / 414,679 filed Nov. 17, 2010, the disclosure of which is hereby incorporated by reference.FIELD OF INVENTION[0003]The invention relates to secure authorization of electronic transactions and / or a right of entry to access secure locations through a matching function of regenerated specified distinctive identifiers drawn from a local / mobile computing device to those specified distinctive identifiers previously registered in a validation database, in order to validate the identity of the local / mobile computing device.BACKGROUND[0004]In the cyber world we live in, the issue of security has risen to new heights of awareness and concern. This can range from the security of your financial and personal data to even issues of physical...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06G06Q20/38G06Q20/40G06F17/30
CPCH04L63/102G06F17/30371G06Q20/40G06Q20/382H04L63/083G06Q20/02G06Q20/1085G06Q20/40145G06Q20/409G06Q20/4097G06Q20/308H04L63/0861H04L2463/082
Inventor STREUTER, GARY WILLIAMPRICE, WILLIAM PAT
Owner INVYSTA TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products