US 12,355,783 B2
Logical validation of devices against fraud and tampering
Janek Klawe, New York, NY (US); and Richard Neal Harris, Mountain View, CA (US)
Assigned to Block, Inc., Oakland, CA (US)
Filed by Block, Inc., San Francisco, CA (US)
Filed on Jun. 9, 2022, as Appl. No. 17/836,892.
Application 17/836,892 is a continuation of application No. 16/848,727, filed on Apr. 14, 2020, granted, now 11,374,949.
Application 16/848,727 is a continuation of application No. 15/858,020, filed on Dec. 29, 2017, abandoned.
Prior Publication US 2022/0368705 A1, Nov. 17, 2022
Int. Cl. H04L 9/40 (2022.01); G06F 21/57 (2013.01); G06Q 20/20 (2012.01); G06Q 20/34 (2012.01); G06Q 20/38 (2012.01); G07F 7/08 (2006.01)
CPC H04L 63/1416 (2013.01) [G06F 21/57 (2013.01); G06Q 20/20 (2013.01); G06Q 20/202 (2013.01); G06Q 20/206 (2013.01); G06Q 20/3567 (2013.01); G06Q 20/382 (2013.01); G07F 7/088 (2013.01); H04L 63/1483 (2013.01); H04L 63/308 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system for evaluating security of a target device capable of performing secure operations, the system comprising:
the target device configured to generate security data in response to one or more instructions;
a remote scanning device configured to:
generate the one or more instructions for evaluating the security of the target device;
evaluate the security data while the target device has an active connection to the remote scanning device; and
in response to evaluating the security data, determine to attest the target device, wherein attestation allows the target device to perform the secure operations; and
a local scanning device or an application communicatively associated with the target device, the local scanning device or the application configured to:
receive at least a subset of the one or more instructions from the remote scanning device;
evaluate the security data while the target device is actively connected to the local scanning device and while the target device lacks the active connection with the remote scanning device; and
in response to evaluating the security data, determine to attest the target device, wherein the attestation allows the target device to perform the secure operations.