发明名称 Method and apparatus for token-based tamper detection
摘要 According to one embodiment, an apparatus may store: a hard token representing identification information of the device, a network token representing the status of a network, and a resource token representing information associated with a resource. The apparatus may further store secured copies of the hard token, network token, and resource token. The apparatus may receive a suspect token indicating a risk that at least one of the device, the network, and the resource has been tampered, and in response, determine to inspect at least one of the hard token, network token, and resource token. The apparatus may then compare the at least one of the hard token, network token, and resource token with its corresponding secured copy. If at least one of those tokens does not match its corresponding secured copy, the apparatus may communicate a revalidation token indicating at least one token has been tampered.
申请公布号 US9069943(B2) 申请公布日期 2015.06.30
申请号 US201113210220 申请日期 2011.08.15
申请人 Bank of America Corporation 发明人 Radhakrishnan Rakesh;Frick Cynthia Ann;Marian Radu;Barbir Abdulkader Omar;Badhwar Rajat P.
分类号 G06F21/00;G06F21/33;H04L9/32;G06F21/57;H04L9/08 主分类号 G06F21/00
代理机构 代理人 Springs Michael A.
主权项 1. An apparatus comprising: a memory storing: a first set of a plurality of tokens, the first set of the plurality of tokens comprising: a hard token representing identification information of a device,a network token representing the status of a network that facilitates communication from the device, anda resource token representing information associated with a resource; anda second set of a plurality of tokens, the second set comprising secured copies of the hard token, network token, and resource token, the second set generated when the hard token, network token, and resource token of the first set were first generated; and a processor: receiving, based on network jitter, a suspect token indicating a risk that at least one of the device, the network, and the resource has been tampered;in response to receiving the suspect token, applying one or more token tampering rules that specify which of the at least one of the hard token, network token, and resource token may have been affected as result of the risk indicated in the suspect token;comparing the at least one of the hard token, network token, and resource token of the first set that is identified by the one or more token tampering rules as being associated with the suspect token with its corresponding secured copy of the second set;in response to determining that the at least one of the hard token, network token, and resource token of the first set does not match the corresponding secured copy of the second set, communicating a revalidation token indicating the at least one token has been tampered;computing, based upon the revalidation token, a risk token representing an increased level of risk associated with the at least one of the device, the network, and the resource; anddetermining, based on the risk token, an access decision associated with the at least one of the device, the network, and the resource.
地址 Charlotte NC US