US 11,716,617 B2
Systems and methods for cryptographic authorization of wireless communications
Christian T Wentz, Providence, RI (US)
Assigned to Ares Technologies, Inc., Boston, MA (US)
Filed by Ares Technologies, Inc.
Filed on Apr. 29, 2020, as Appl. No. 16/861,699.
Claims priority of provisional application 62/841,934, filed on May 2, 2019.
Prior Publication US 2020/0351657 A1, Nov. 5, 2020
Int. Cl. H04W 12/06 (2021.01); H04L 9/32 (2006.01); H04W 12/63 (2021.01)
CPC H04W 12/06 (2013.01) [H04L 9/3218 (2013.01); H04L 9/3247 (2013.01); H04L 9/3278 (2013.01); H04W 12/63 (2021.01)] 18 Claims
OG exemplary drawing
 
1. A method of cryptographic authorization of wireless communications, the method comprising:
receiving, at a verifying node, a transfer request from a user device to execute an asset transfer transaction;
authenticating, by the verifying node, the transfer request as a function of a biometric authentication;
calculating, by the verifying node, at least a heuristic of trust of the user device by determining a degree of obscurity of the user device;
assigning, by the verifying node, a confidence level to the user device as a function of the biometric authentication and the degree of obscurity of the user device, wherein assigning the confidence level further comprises:
assigning a first threshold confidence level to the user device as a function of at least a first biometric authentication and a second biometric authentication; and
assigning, if the first threshold confidence level is met by the user device, a second threshold confidence level to the user device as a function of the first biometric authentication for a subsequent stage of the asset transfer transaction, wherein the second threshold confidence level is lower than the first threshold confidence level;
generating, by the verifying node, a transfer authorization token, wherein generating the transfer authorization token further comprises:
associating, the transfer request from the user with at least an authorization datum;
digitally signing the authorization datum with a private key, wherein the private key is generated from a physically unclonable function associated with unique physical characteristics of a hardware processor; and
generating the transfer authorization token containing the digitally authorization datum;
providing, by the verifying node, the transfer authorization token to at least one recipient device; and
transferring, from the user device to the at least one recipient, an asset as a function of the transfer authorization token.