×

Systems and methods for device verification and authentication

  • US 10,057,269 B1
  • Filed: 04/21/2017
  • Issued: 08/21/2018
  • Est. Priority Date: 04/21/2017
  • Status: Active Grant
First Claim
Patent Images

1. A system for authenticating computing devices, comprising:

  • a first computing device, comprising;

    a first memory; and

    a first processor configured with processor-executable instructions to perform operations comprising;

    selecting first elements from a shared data set stored at the first computing device, wherein the shared data set is also stored at the second computing device;

    generating a first rule set for extracting the selected first elements from the shared data set;

    transforming the selected first elements to generate a first result; and

    sending the first rule set to the second computing device; and

    a second computing device, comprising;

    a communication interface;

    a second memory; and

    a second processor coupled to the communication interface and configured with processor-executable instructions to perform operations comprising;

    receiving the first rule set from the first computing device;

    extracting the selected first elements from the shared data set stored at the second computing device using the rule set;

    transforming the extracted first elements to generate a second result;

    sending the generated second result to the first computing device;

    selecting second elements from the shared data set stored at the second computing device;

    generating a second rule set for extracting the selected second elements from the shared data set; and

    sending the second rule set to the first computing device;

    wherein the processor of the first computing device is further configured with processor-executable instructions to perform operations comprising;

    extracting the selected second elements from the shared data set stored at the first computing device using the second rule set;

    transforming the extracted second elements to generate a third result;

    sending the generated third result to the second computing device;

    determining whether the first result matches the second result; and

    determining whether the second computing device is authenticated based on whether the first result matches the second result; and

    wherein the processor of the second computing device is further configured with processor-executable instructions to perform operations comprising;

    transforming the selected second elements to generate a fourth result;

    determining whether the third result matches the fourth result; and

    determining whether the first computing device is authenticated based on whether the third result matches the fourth result.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×