MULTI-USE LONG STRING ANTI-TAMPERING AUTHENTICATION SYSTEM
This disclosure describes systems and methods for implementing techniques that use multi-use long string authentication keys to protect the transfer of data resources from a sending device to a recipient device. More specifically, an anti-tampering authentication application is described that may re...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | This disclosure describes systems and methods for implementing techniques that use multi-use long string authentication keys to protect the transfer of data resources from a sending device to a recipient device. More specifically, an anti-tampering authentication application is described that may reside on client devices that send and receive data resources. An anti-tampering authentication application, on a sending device, may generate a protected data resource by mathematically coupling an authentication key with a data resource intended for delivery to a recipient device. The anti-tampering authentication application may also generate computational instructions that automatically decouple the protected data resource from the authentication key in response to a successful authentication of an authentication string at the recipient device. Additionally, the anti-tampering authentication application, on the recipient device, may execute the computational instructions and automatically decouple the authentication key from the protected resource, in response to a successful authentication of the authentication string. |
---|