one
Systems and methods for authenticated communication sessions
Last updated:
Abstract:
Aspects of this disclosure relate to authenticating a communication session. In some variations, a secured hardware storage area may be utilized to store at least one key credential. A communication session may be established from an enterprise associated application. To verify the authenticity of the communication session, a customer system and a host enterprise system may exchange a token. The token which may be signed with a key credential to validate a communication session. Additional validation data may be exchanged between operators of the customer system and a host enterprise system.
Status:
Grant
Type:
Utility
Filling date:
10 Sep 2020
Issue date:
14 Jun 2022