one
Systems and methods for authenticated communication sessions

Last updated:

Abstract:

Aspects of this disclosure relate to authenticating a communication session. In some variations, a secured hardware storage area may be utilized to store at least one key credential. A communication session may be established from an enterprise associated application. To verify the authenticity of the communication session, a customer system and a host enterprise system may exchange a token. The token which may be signed with a key credential to validate a communication session. Additional validation data may be exchanged between operators of the customer system and a host enterprise system.

Status:
Grant
Type:

Utility

Filling date:

10 Sep 2020

Issue date:

14 Jun 2022