US 11,870,801 B2
Protecting computer system end-points using activators
George Chen Kaidi, Singapore (SG)
Assigned to PayPal, Inc., San Jose, CA (US)
Filed by PAYPAL, INC., San Jose, CA (US)
Filed on Jan. 27, 2021, as Appl. No. 17/159,836.
Prior Publication US 2022/0239689 A1, Jul. 28, 2022
Int. Cl. H04L 29/06 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/1441 (2013.01) [H04L 63/083 (2013.01); H04L 63/126 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
receiving key activators at an authentication module of a computing device, wherein the key activators include a first key activator and a second key activator incorporated into a sequence of Unified Resource Identifiers (URIs), wherein a first Unified Resource Identifier (URI) in the sequence of URIs includes the first key activator and a second URI in the sequence of URIs includes the second key activator;
extracting the first key activator from the first URI and the second key activator from the second URI;
validating, at the authentication module, the key activators, wherein the validated key activators are configured to activate the authentication module for authenticating a security credential during a predefined time interval;
subsequent to validating the key activators, receiving the security credential at the authentication module;
authenticating the security credential using the authentication module; and
transmitting an indicator indicating whether the authentication module authenticated the security credential.