US 11,757,629 B2
Methods and computing devices for auto-submission of user authentication credential
Naveen Kumar Gupta, Pune (IN); Bhargav Jagdishchandra Modi, Ahmedabad (IN); and Namod Chandrashekar Kunder, Pune (IN)
Assigned to MASTERCARD INTERNATIONAL INCORPORATED, Purchase, NY (US)
Filed by MASTERCARD INTERNATIONAL INCORPORATED, Purchase, NY (US)
Filed on Jul. 22, 2020, as Appl. No. 16/935,984.
Claims priority of application No. 10201906806X (SG), filed on Jul. 23, 2019.
Prior Publication US 2021/0028932 A1, Jan. 28, 2021
Int. Cl. H04L 9/08 (2006.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01)
CPC H04L 9/0844 (2013.01) [H04L 9/3242 (2013.01); H04L 63/08 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising:
pre-storing a user authentication credential in an encrypted form on a companion application running on a second computing device, wherein pre-storing the user authentication credential comprises:
generating a fourth encrypted data by encrypting a third encrypted data having the user authentication credential using a mutual authentication key;
generating a fifth encrypted data by appending a second Message Authentication Code (MAC2) generated using the mutual authentication key to the fourth encrypted data; and
sending the fifth encrypted data to the second computing device via a communication channel;
initiating, by a first computing device of a user, a detection of the second computing device of the user, the detection initiated based at least on an application requiring a user authentication credential to be entered, wherein the application is running on the first computing device and the user authentication credential is pre-stored in an encrypted form on a companion application running on the second computing device;
generating, by the first computing device, the communication channel with the second computing device, the communication channel generated based at least on generating the mutual authentication key by the first computing device and the second computing device;
sending, by the first computing device, a request to receive the user authentication credential to be entered on the companion application on the second computing device via the communication channel;
receiving, by the first computing device, the fifth encrypted data that includes the user authentication credential from the second computing device via the communication channel in the encrypted form;
decrypting, by the first computing device, the user authentication credential received in the fifth encrypted data; and
facilitating, by the first computing device, the entering of the user authentication credential on the application without user intervention.