Permanently affixed un-decryptable identifier associated with mobile device
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04W-012/06
H04W-004/02
H04L-029/06
H04W-012/12
H04W-064/00
출원번호
US-0928161
(2015-10-30)
등록번호
US-9820148
(2017-11-14)
발명자
/ 주소
Jones-McFadden, Alicia C.
Votaw, Elizabeth S.
출원인 / 주소
BANK OF AMERICA CORPORATION
대리인 / 주소
Springs, Michael A.
인용정보
피인용 횟수 :
0인용 특허 :
57
초록▼
Embodiments of the invention are directed to a system, method, or computer program product for providing a permanently affixed un-decryptable coded identifier onto a mobile device. The identifier may be one or more applications, pictures, widgets, tokens, or the like that may be transformed into an
Embodiments of the invention are directed to a system, method, or computer program product for providing a permanently affixed un-decryptable coded identifier onto a mobile device. The identifier may be one or more applications, pictures, widgets, tokens, or the like that may be transformed into an identifier to include the objects original functionality plus additional coding. The identifier, once selected by the user may be coded to include a tracker, beacon, and coded with remote access abilities. The identifier may then be permanently installed onto the user's mobile device. As such providing a trackable code associated with a mobile device, if the mobile device is misplaced. Furthermore, the identifier may be permanently stored within the mobile device preventing complete erasing of the identifier upon complete data deletion of the user device.
대표청구항▼
1. A system for creating and storing an un-decryptable identifier on a mobile device, the system comprising: a memory device with computer-readable program code stored thereon;a communication device;a processing device operatively coupled to the memory device and the communication device, wherein th
1. A system for creating and storing an un-decryptable identifier on a mobile device, the system comprising: a memory device with computer-readable program code stored thereon;a communication device;a processing device operatively coupled to the memory device and the communication device, wherein the processing device is configured to execute the computer-readable program code to: receive a request and authorization from a user to generate the identifier on the mobile device of the user;present one or more objects to the user that can be coded as the identifier, wherein the one or more objects presented have an original function associated with each of the one or more objects;receive a selected object from the user, wherein the selected object is selected to be the identifier;code the selected object allowing the identifier to be maintained on the mobile device after a complete wipe out, deletion, or clearing of all the data on the mobile device, wherein coding comprises coding the selected object with a beacon code, and a remote deletion code to become the identifier, wherein coding the selected object further comprises maintaining the original function of the selected object;transmit the identifier to the mobile device associated with the user;store, upon user authorization, the identifier on the mobile device, wherein storing further comprises integrating the identifier into storage with like objects;identify misplacement or misappropriation of the mobile device; andactivate, based on identifying the misplacement or the misappropriation of the mobile device, the beacon code for identifying a location of the mobile device. 2. The system of claim 1, wherein the beacon code comprises a location beacon that creates a secure communicable link to transmit a location of the mobile device, wherein the beacon code is activated upon an identification of an attempted deletion of the identifier. 3. The system of claim 1, wherein the remote deletion code comprises code that allows the user to connect remotely to the mobile device and allows for remote deletion one or more personal items from the mobile device. 4. The system of claim 1, wherein identifying misplacement or misappropriation of the mobile device further comprises automatically identifying misplacement of the mobile device based on inactivity of the identifier and automatically identifying misappropriation of the mobile device by identifying an attempt to delete the identifier. 5. The system of claim 1, wherein the one or more objects that can be coded as the identifier include applications, widgets, pictures, or contacts associated with the mobile device of the user. 6. The system of claim 1, further comprising accessing the mobile device of the user and extracting applications, widgets, pictures, and contacts that can be coded as the identifier. 7. The system of claim 1, wherein storing the identifier on the mobile device further comprises permanently affixing the identifier on the mobile device, wherein storing further comprises integrating the identifier into storage with like objects on the mobile device. 8. A computer program product for creating and storing an un-decryptable identifier on a mobile device, the computer program product comprising at least one non-transitory computer-readable medium having computer-readable program code portions embodied therein, the computer-readable program code portions comprising: an executable portion configured for receiving a request and authorization from a user to generate the identifier on the mobile device of the user;an executable portion configured for presenting one or more objects to the user that can be coded as the identifier, wherein the one or more objects presented have an original function associated with each of the one or more objects;an executable portion configured for receiving a selected object from the user, wherein the selected object is selected to be the identifier;an executable portion configured for coding the selected object allowing the identifier to be maintained on the mobile device after a complete wipe out, deletion, or clearing of all the data on the mobile device, wherein coding comprises coding the selected object with a beacon code, and a remote deletion code to become the identifier, wherein coding the selected object further comprises maintaining the original function of the selected object;an executable portion configured for transmitting the identifier to the mobile device associated with the user;an executable portion configured for storing, upon user authorization, the identifier on the mobile device, wherein storing further comprises integrating the identifier into storage with like objects;an executable portion configured for identifying misplacement or misappropriation of the mobile device; andan executable portion configured for activating, based on identifying the misplacement or the misappropriation of the mobile device, the beacon code for identifying a location of the mobile device. 9. The computer program product of claim 8, wherein the beacon code comprises a location beacon that creates a secure communicable link to transmit a location of the mobile device, wherein the beacon code is activated upon an identification of an attempted deletion of the identifier. 10. The computer program product of claim 8, wherein the remote deletion code comprises code that allows the user to connect remotely to the mobile device and allows for remote deletion one or more personal items from the mobile device. 11. The computer program product of claim 8, wherein identifying misplacement or misappropriation of the mobile device further comprises automatically identifying misplacement of the mobile device based on inactivity of the identifier and automatically identifying misappropriation of the mobile device by identifying an attempt to delete the identifier. 12. The computer program product of claim 8, wherein the one or more objects that can be coded as the identifier include applications, widgets, pictures, or contacts associated with the mobile device of the user. 13. The computer program product of claim 8, further comprising an executable portion configured for accessing the mobile device of the user and extracting applications, widgets, pictures, and contacts that can be coded as the identifier. 14. The computer program product of claim 8, wherein storing the identifier on the mobile device further comprises permanently affixing the identifier on the mobile device, wherein storing further comprises integrating the identifier into storage with like objects on the mobile device. 15. A computer-implemented method for creating and storing an un-decryptable identifier on a mobile device, the method comprising: providing a computing system comprising a computer processing device and a non-transitory computer readable medium, where the computer readable medium comprises configured computer program instruction code, such that when said instruction code is operated by said computer processing device, said computer processing device performs the following operations: receiving a request and authorization from a user to generate the identifier on the mobile device of the user;presenting one or more objects to the user that can be coded as the identifier, wherein the one or more objects presented have an original function associated with each of the one or more objects;receiving selected object from the user, wherein the selected object is selected to be the identifier;coding the selected object allowing the identifier to be maintained on the mobile device after a complete wipe out, deletion, or clearing of all the data on the mobile device, wherein coding comprises coding the selected object with a beacon code, and a remote deletion code to become the identifier, wherein coding the selected object further comprises maintaining the original function of the selected object;transmitting the identifier to the mobile device associated with the user;storing, upon user authorization, the identifier on the mobile device, wherein storing further comprises integrating the identifier into storage with like objects;identifying misplacement or misappropriation of the mobile device; andactivating, based on identifying the misplacement or the misappropriation of the mobile device, the beacon code for identifying a location of the mobile device. 16. The computer-implemented method of claim 15, wherein the beacon code comprises a location beacon that creates a secure communicable link to transmit a location of the mobile device, wherein the beacon code is activated upon an identification of an attempted deletion of the identifier. 17. The computer-implemented method of claim 15, wherein the remote deletion code comprises code that allows the user to connect remotely to the mobile device and allows for remote deletion one or more personal items from the mobile device. 18. The computer-implemented method of claim 15, wherein identifying misplacement or misappropriation of the mobile device further comprises automatically identifying misplacement of the mobile device based on inactivity of the identifier and automatically identifying misappropriation of the mobile device by identifying an attempt to delete the identifier. 19. The computer-implemented method of claim 15, wherein the one or more objects that can be coded as the identifier include applications, widgets, pictures, or contacts associated with the mobile device of the user. 20. The computer-implemented method of claim 15, wherein storing the identifier on the mobile device further comprises permanently affixing the identifier on the mobile device, wherein storing further comprises integrating the identifier into storage with like objects on the mobile device.
Kao, I-Lung; Milman, Ivan Matthew; Schneider, David J.; Willard, Ronald Gene, Authentication framework for multiple authentication processes and mechanisms.
Vermeulen, Allan H.; Atlas, Alan B.; Barth, David M.; Cormie, John David; Fischman, Ami K.; Sorenson, III, James Christopher; Wagner, Eric M., Distributed storage system with web services client interface.
Ayanamcottil, Antony Aloysius; Chandrappa, Varun Yarehalli; Revankar, Natesh Shridhar; Verma, Priya; Alam, Mohammad Dilshad; Sharma, Nitin Prakash; Pullaikudi, Praveen Prakash Thazhalhu, Method for destructive readout of data in case of mobile theft.
Natsuno,Takeshi, Method for inhibiting use of mobile communication terminal having memory where card information is stored, mobile communication network, and mobile communication terminal.
Aravamudan, Murali; Rajasekharan, Ajit; Ramakrishnan, Kajamalai G.; Gupta, Mayank, Methods and systems for segmenting relative user preferences into fine-grain and coarse-grain collections.
Grigg, David M.; Thomas, Susan Smith; Harkey, Scott Lee; Bondesen, Laura; Calman, Matthew A., Providing automated initial and final payment for an activity based on determining the location of an activity participant's mobile communication device.
Ellis, Stephen M.; Kennedy, Michael J.; Kurani, Ashish Bhoopen; Lowry, Melissa; Meyyappan, Uma; Sahni, Bipin; Stroke, Nikolai, System and method for a mobile wallet.
Berardi,Michael J.; Bliman,Michal; Bonalle,David S.; Elwood,Jennifer Anne; Hood,Matthew C.; Isenberg,Susan E.; Mayers,Alexandra; Saunders,Peter D.; Scheding,Kathryn D.; Shah,Sejal Ajit; Williamson,Jo, System and method for payment using radio frequency identification in contact and contactless transactions.
Dhesi, Rajkaran Singh; Hunt, Simon; Parke, Paul Martin, System, method, and computer program product for disabling a communication channel during authentication.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.