US 11,677,565 B2
Network-based device authentication system
Patricia Kinney, Cary, NC (US); Sumit Deshpande, Rolesville, NC (US); Matthew Whitley, Cary, NC (US); Gopinath Rajagopal, Cary, NC (US); Michael Anthony Dascola, Raleigh, NC (US); Satya Acharya, Raleigh, NC (US); and Angela Taylor, Raleigh, NC (US)
Assigned to Truist Bank, Charlotte, NC (US)
Filed by Truist Bank, Charlotte, NC (US)
Filed on May 20, 2020, as Appl. No. 16/878,886.
Application 16/878,886 is a continuation of application No. 16/250,498, filed on Jan. 17, 2019, granted, now 10,700,873.
Application 16/250,498 is a continuation of application No. 15/170,339, filed on Jun. 1, 2016, granted, now 10,218,510, issued on Feb. 26, 2019.
Claims priority of provisional application 62/169,333, filed on Jun. 1, 2015.
Prior Publication US 2020/0280451 A1, Sep. 3, 2020
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/32 (2006.01); H04L 9/40 (2022.01); G06F 21/44 (2013.01); G06F 21/32 (2013.01)
CPC H04L 9/3247 (2013.01) [G06F 21/32 (2013.01); G06F 21/44 (2013.01); H04L 9/3226 (2013.01); H04L 9/3297 (2013.01); H04L 63/083 (2013.01); H04L 63/0876 (2013.01)] 14 Claims
OG exemplary drawing
 
1. A system comprising:
a processor; and
a memory comprising instructions that are executable by the processor for causing the processor to:
receive user authentication information from a user device;
authenticate the user device using the user authentication information;
based on authenticating the user device:
generate a token code,
determine a signature key,
transmit the token code and the signature key to the user device, and
associate a device identifier with the token code and the signature key in a database, wherein the device identifier corresponds to the user device;
subsequent to transmitting the signature key to the user device, receive a request for secure information from the user device, wherein the request includes:
the token code,
the device identifier corresponding to the user device,
and
an encrypted signature including a version of the device identifier and the token code encrypted by the user device using the signature key; and
subsequent to receiving the request:
generate a server-side signature that includes a version of the device identifier and the token code encrypted using a stored signature key retrieved from the database or another database;
compare the server-side signature to the encrypted signature in the request to determine a signature match; and
based on determining the signature match, authenticate the user device to access the secure information.