Patent Issued for Authenticating devices via tokens and verification computing devices (USPTO 11811754): Allstate Insurance Company
2023 NOV 23 (NewsRx) -- By a
The assignee for this patent, patent number 11811754, is
Reporters obtained the following quote from the background information supplied by the inventors: “Users may desire to use their device(s), such as a smartphone or a laptop computer, to perform one or more activities with other devices or users of those other devices. A user may encrypt information used for the activity and send the encrypted information to the other device, and the other device may authenticate the user based on the information. However, various network and identity security issues may be present under these scenarios. For example, a spoofing attack may be used to copy the user’s information and attempt to perform a fraudulent activity with the other device, which may perceive that the information is coming from the user. A bad actor may hack into the user’s device or intercept messages transmitted between the user’s device and the other device in order to obtain the user’s information. The bad actor may be able to imitate the user and perform activities as the user.”
In addition to obtaining background information on this patent, NewsRx editors also obtained the inventors’ summary information for this patent: “The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosure. The summary is not an extensive overview of the disclosure. It is neither intended to identify key or critical elements of the disclosure nor to delineate the scope of the disclosure. The following summary merely presents some concepts of the disclosure in a simplified form as a prelude to the description below.
“Aspects of the disclosure relate to a computing device, apparatus, system, and/or method comprising generating, by a verification computing device, a pseudorandom sequence. Based on the pseudorandom sequence, the verification computing device may select, from a first database, a first plurality of parameters associated with a user. The method may comprise transmitting, to a first device associated with the user, the pseudorandom sequence for the first device to select a second plurality of parameters from a second database. The verification computing device may receive, from a second device, a token generated by the first device based on the second plurality of parameters. Based on the token, the first device may be authenticated.
“In some examples, the token may comprise a first token, and the verification computing device may generate a second token based on the first plurality of parameters. Authenticating the first device may be based on a comparison between the first token and the second token.
“In some examples, after authenticating the first device, the method may comprise transmitting, to the first device, first information indicating the first device is authenticated. Second information indicating the first device is authenticated may be transmitted to the second device. Additionally or alternatively, an instruction for the first device to transmit the first information to the second device may be transmitted to the first device.
“Is some examples, the method may comprise synchronizing parameters associated with the user stored in the first database with parameters associated with the user stored in the second database. Additionally or alternatively, the method may comprise updating one or more of the first database or the second database with one or more of the token, metadata generated during authentication of the first device, or transaction information between the first device and the second device.”
The claims supplied by the inventors are:
“1. A method comprising: receiving, by a first device associated with a user and from a verification computing device, a pseudorandom sequence; based on the pseudorandom sequence, selecting, by the first device and from a database, a plurality of parameters associated with the user; generating, by the first device and based on the plurality of parameters, a token; transmitting, by the first device and to a second device, the token for authenticating the first device.
“2. The method of claim 1, further comprising, after transmitting the token: receiving, by the first device and from the verification computing device, information indicating the first device is authenticated.
“3. The method of claim 1, further comprising, after transmitting the token: receiving, from the verification computing device, information indicating the first device is authenticated.
“4. The method of claim 3, further comprising, after transmitting the token: transmitting, by the first device and to the second device, the information indicating the first device is authenticated.
“5. The method of claim 1, further comprising: synchronizing parameters associated with the user stored in the database with parameters associated with the user stored in a second database associated with the verification computing device.
“6. The method of claim 1, further comprising: updating the database with one or more of the token, metadata generated during generation of the token, or transaction information between the first device and the second device.
“7. The method of claim 1, wherein selecting the plurality of parameters comprises selecting, by a proxy associated with the first device, the plurality of parameters, and wherein generating the token comprises generating, by the proxy associated with the first device, the token.
“8. One or more non-transitory computer readable media storing instructions which, when executed by one or more processors of a first device associated with a user, cause the one or more processors to: receive, from a verification computing device, a pseudorandom sequence; based on the pseudorandom sequence, select, from a database, a plurality of parameters associated with the user; generate, based on the plurality of parameters, a token; transmit, to a second device, the token for authenticating the first device.
“9. The one or more non-transitory computer readable media of claim 8, storing instructions which, when executed by one or more processors, cause the one or more processors to, after transmitting the token: receive, from the verification computing device, information indicating the first device is authenticated.
“10. The one or more non-transitory computer readable media of claim 9, storing instructions which, when executed by one or more processors, cause the one or more processors to, after transmitting the token: receive, from the verification computing device, information indicating the first device is authenticated.
“11. The one or more non-transitory computer readable media of claim 10, storing instructions which, when executed by one or more processors, cause the one or more processors to, after transmitting the token: transmit, to the second device, the information indicating the first device is authenticated.
“12. The one or more non-transitory computer readable media of claim 8, storing instructions which, when executed by one or more processors, cause the one or more processors to: synchronize parameters associated with the user stored in the database with parameters associated with the user stored in a second database associated with the verification computing device.
“13. The one or more non-transitory computer readable media of claim 8, storing instructions which, when executed by one or more processors, cause the one or more processors to: update the database with one or more of the token, metadata generated during generation of the token, or transaction information between the first device and the second device.
“14. The one or more non-transitory computer readable media of claim 8, wherein selecting the plurality of parameters comprises selecting, by a proxy associated with the first device, the plurality of parameters, and wherein generating the token comprises generating, by the proxy associated with the first device, the token.
“15. A device comprising: one or more processors; memory storing instructions which, when executed by the one or more processors, cause the device to: receive, from a verification computing device, a pseudorandom sequence; based on the pseudorandom sequence, select, from a database, a plurality of parameters associated with a user; generate, based on the plurality of parameters, a token; transmit, to a second device, the token for authenticating the device.
“16. The device of claim 15, the memory storing instructions which, when executed by the one or more processors, cause the device to, after transmitting the token: receive, from the verification computing device, information indicating the device is authenticated.
“17. The device of claim 15, the memory storing instructions which, when executed by the one or more processors, cause the device to, after transmitting the token: receive, from the verification computing device, information indicating the device is authenticated; and transmit, to the second device, the information indicating the device is authenticated.
“18. The device of claim 15, the memory storing instructions which, when executed by the one or more processors, cause the device to: synchronize parameters associated with the user stored in the database with parameters associated with the user stored in a second database associated with the verification computing device.
“19. The device of claim 15, the memory storing instructions which, when executed by the one or more processors, cause the device to: update the database with one or more of the token, metadata generated during generation of the token, or transaction information between the device and the second device.
“20. The device of claim 15, wherein selecting the plurality of parameters comprises selecting, by a proxy associated with the device, the plurality of parameters, and wherein generating the token comprises generating, by the proxy associated with the device, the token.”
For more information, see this patent: Harris, David. Authenticating devices via tokens and verification computing devices.
(Our reports deliver fact-based news of research and discoveries from around the world.)
Aspen Reports Results for the Three and Nine Months Ended September 30, 2023
Anti-clotting pill reduced stroke risk in adults with symptomless, irregular heart rhythm: American Heart Association
Advisor News
Annuity News
Health/Employee Benefits News
Life Insurance News