US 9,811,828 B2
Method for authentication of mobile transactions using video encryption and method for video encryption
Fabio R. Piva, Campinas (BR); Vanessa Testoni, Campinas (BR); and Fernando L. Koch, Campinas (BR)
Assigned to SAMSUNG ELECTRÔNICA DA AMAZÔNIA LTDA., Campinas-São Paulo (BR)
Filed by SAMSUNG ELETRÔNICA DA AMAZÔNIA LTDA., Campinas (BR)
Filed on May 23, 2014, as Appl. No. 14/286,385.
Claims priority of application No. 1020140076662 (BR), filed on Mar. 28, 2014.
Prior Publication US 2015/0278807 A1, Oct. 1, 2015
Int. Cl. H04L 29/06 (2006.01); G06Q 20/38 (2012.01); G06Q 20/32 (2012.01); G06Q 20/36 (2012.01); G06Q 20/40 (2012.01); G07F 7/08 (2006.01)
CPC G06Q 20/3829 (2013.01) [G06Q 20/322 (2013.01); G06Q 20/36 (2013.01); G06Q 20/3823 (2013.01); G06Q 20/407 (2013.01); G07F 7/084 (2013.01); G07F 7/0813 (2013.01)] 9 Claims
OG exemplary drawing
 
1. A method for authenticating mobile transactions using video encryption in a client application running on a mobile device, the method comprising:
detecting an authentication request for a transaction through the client application;
sending the authentication request of the client application to a server application;
generating a random authentication key for the transaction in the server application based on a neighbor set of a superpixel of a frame including the random authentication key, non-complement sets of the superpixel, and complement sets of the superpixel;
generating an encrypted video embedded with the generated authentication key;
sending the encrypted video with the embedded authentication key to the client application running on the mobile device;
displaying the encrypted video with the embedded authentication key in the client application;
overlaying a safe card with a reusable secret pattern on a screen of the mobile device during video playback allowing a user to view information related to the transaction and the authentication key;
entering, by the user, the embedded authentication key revealed with the overlaid safe card, and
validating the transaction by comparing the entered authentication key with the embedded authentication key.