The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 04, 2018

Filed:

Aug. 24, 2017
Applicant:

Barclays Bank Plc, London, Greater London, GB;

Inventors:

Steven Bradley, London, GB;

Conall O'Brien, Cheshire, GB;

Jeremy Goldstone, Manchester, GB;

Andrew Crichton, Cheshire, GB;

James Sellwood, Surrey, GB;

Anthony Ryan, London, GB;

Assignee:

Barclays Bank PLC, London, GB;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04W 12/06 (2009.01); G06F 21/42 (2013.01); H04L 9/32 (2006.01); H04W 4/00 (2018.01); H04W 4/50 (2018.01);
U.S. Cl.
CPC ...
H04L 63/083 (2013.01); G06F 21/42 (2013.01); H04L 9/3213 (2013.01); H04L 9/3226 (2013.01); H04L 63/0807 (2013.01); H04W 12/06 (2013.01); H04L 63/067 (2013.01); H04L 63/0838 (2013.01); H04L 2463/061 (2013.01); H04W 4/001 (2013.01); H04W 4/50 (2018.02);
Abstract

Secure registration of a new application with a server system is provided. An old application has been registered with the system. A first link between the new application and the system establishes a first key and first check data is communicated from the system to the new application and passed to the old application. A second link between the old application and the system establishes a second key based on input of a credential to the old application; the first check data is communicated from the old application to the system. Enciphered second check data is communicated from the system to the old application over the second link and further encrypted by the old application using a third key. This generates doubly-enciphered check data which is passed to the new application and decrypted using the first key and a fourth key, generated at the new application based on the first check data and input of the credential to the new application.


Find Patent Forward Citations

Loading…