US 12,328,387 B2
Dynamic privacy-preserving application authentication
Mihai Christodorescu, San Francisco, CA (US); Maliheh Shirvanian, San Francisco, CA (US); and D. M. Shams Zawoad, San Francisco, CA (US)
Assigned to Visa International Service Association, San Francisco, CA (US)
Appl. No. 18/023,971
Filed by Visa International Service Association, San Francosco, CA (US)
PCT Filed Sep. 2, 2021, PCT No. PCT/US2021/048822
§ 371(c)(1), (2) Date Feb. 28, 2023,
PCT Pub. No. WO2022/051463, PCT Pub. Date Mar. 10, 2022.
Claims priority of provisional application 63/074,355, filed on Sep. 3, 2020.
Prior Publication US 2023/0246820 A1, Aug. 3, 2023
Int. Cl. H04L 9/08 (2006.01); H04L 9/30 (2006.01)
CPC H04L 9/0825 (2013.01) [H04L 9/0894 (2013.01); H04L 9/3026 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
receiving, by a server computer, an authentication request comprising an application identifier associated with an application or a user device identifier associated with a user device, the authentication request originating from the user device;
receiving, by the server computer, a set of behavioral data associated with the application or the user device;
responsive to receiving the application identifier or device identifier, obtaining, by the server computer, a fuzzy vault associated with the application identifier or the user device identifier; and
determining, by the server computer, a reconstructed key value using the fuzzy vault and the set of behavioral data,
wherein the application or the user device is authenticated using the reconstructed key value, wherein the set of behavioral data is a first set of behavioral data, and wherein the method further comprises an enrollment process, the enrollment process including:
receiving, by the server computer, an enrollment request comprising the application identifier or the user device identifier and an enrollment key value;
receiving, by the server computer, a second set of behavioral data associated with the user device or the application;
forming, by the server computer, a polynomial using the enrollment key value, wherein one or more portions of the enrollment key value form coefficients of the polynomial;
determining, by the server computer, a set of genuine points by inputting the second set of behavioral data into the polynomial; and
forming the fuzzy vault using the set of genuine points and random chaff points, wherein the fuzzy vault comprises the set of genuine points and the random chaff points on a graph.