×

Systems and methods for device authentication

  • US 10,021,100 B2
  • Filed: 06/27/2017
  • Issued: 07/10/2018
  • Est. Priority Date: 09/12/2016
  • Status: Active Grant
First Claim
Patent Images

1. A system for authenticating an Internet of Things (IoT) device to a first computing device through interaction with a second computing device, comprising:

  • the IoT device, comprising;

    a first communication interface; and

    a first processor coupled to the communication interface and configured with processor-executable instructions to perform operations comprising;

    obtaining an ephemeral first transitory identity at the IoT device;

    sending the first transitory identity to the first computing device and to the second computing device;

    receiving an ephemeral second transitory identity from the first computing device;

    sending a first authentication query including the second transitory identity to the second computing device; and

    receiving from the second computing device an indication of whether the first computing device is authenticated;

    the first computing device, comprising;

    a second communication interface; and

    a second processor coupled to the communication interface and configured with processor-executable instructions to perform operations comprising;

    obtaining the second transitory identity at the first computing device;

    sending the second transitory identity to the IoT device and to the second computing device;

    receiving the first transitory identity from the IoT device;

    sending a second authentication query including the first transitory identity to the second computing device; and

    receiving from the second computing device an indication of whether the IoT device is authenticated; and

    the second computing device, comprising;

    a third communication interface; and

    a third processor coupled to the communication interface and configured with processor-executable instructions to perform operations comprising;

    receiving the first transitory identity from the IoT device;

    receiving the second authentication query;

    determining whether the first transitory identity from the IoT device matches the first transitory identity from the first computing device;

    sending to the first computing device the indication of whether the IoT device is authenticated based on the determination of whether the first transitory identity from the IoT device matches the first transitory identity from the first computing device;

    receiving the second transitory identity from the first computing device;

    receiving the first authentication query;

    determining whether the second transitory identity from the IoT device matches the second transitory identity from the firs computing device; and

    sending to the IoT device an indication of whether the first computing device is authenticated based on the determination of whether the second transitory identity from the IoT device matches the second transitory identity from the first computing device.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×