Systems and methods for device verification and authentication
First Claim
1. A system for authenticating computing devices, comprising:
- a first computing device, comprising;
a first memory; and
a first processor configured with processor-executable instructions to perform operations comprising;
selecting first elements from a shared data set stored at the first computing device, wherein the shared data set is also stored at the second computing device;
generating a first rule set for extracting the selected first elements from the shared data set;
transforming the selected first elements to generate a first result; and
sending the first rule set to the second computing device; and
a second computing device, comprising;
a communication interface;
a second memory; and
a second processor coupled to the communication interface and configured with processor-executable instructions to perform operations comprising;
receiving the first rule set from the first computing device;
extracting the selected first elements from the shared data set stored at the second computing device using the rule set;
transforming the extracted first elements to generate a second result;
sending the generated second result to the first computing device;
selecting second elements from the shared data set stored at the second computing device;
generating a second rule set for extracting the selected second elements from the shared data set; and
sending the second rule set to the first computing device;
wherein the processor of the first computing device is further configured with processor-executable instructions to perform operations comprising;
extracting the selected second elements from the shared data set stored at the first computing device using the second rule set;
transforming the extracted second elements to generate a third result;
sending the generated third result to the second computing device;
determining whether the first result matches the second result; and
determining whether the second computing device is authenticated based on whether the first result matches the second result; and
wherein the processor of the second computing device is further configured with processor-executable instructions to perform operations comprising;
transforming the selected second elements to generate a fourth result;
determining whether the third result matches the fourth result; and
determining whether the first computing device is authenticated based on whether the third result matches the fourth result.
4 Assignments
0 Petitions
Accused Products
Abstract
In methods, systems, and computing devices configured to implement methods of authenticating a computing device, a first computing device and a second computing device may share a dynamically updated shared data set. The first computing device may select elements of the shared data set stored at the first computing device and may generate a rule set for extracting the selected elements from the shared data set. The first computing device may send the rule set to the second computing device, and may generate a first result using the selected elements. The second computing device may extract the selected elements from the shared data set using the rule set, may generate a second result, and may send the second result to the first computing device. The first computing device may determine whether the second computing device is authenticated based on whether the first result matches the second result.
43 Citations
16 Claims
-
1. A system for authenticating computing devices, comprising:
-
a first computing device, comprising; a first memory; and a first processor configured with processor-executable instructions to perform operations comprising; selecting first elements from a shared data set stored at the first computing device, wherein the shared data set is also stored at the second computing device; generating a first rule set for extracting the selected first elements from the shared data set; transforming the selected first elements to generate a first result; and sending the first rule set to the second computing device; and a second computing device, comprising; a communication interface; a second memory; and a second processor coupled to the communication interface and configured with processor-executable instructions to perform operations comprising; receiving the first rule set from the first computing device; extracting the selected first elements from the shared data set stored at the second computing device using the rule set; transforming the extracted first elements to generate a second result; sending the generated second result to the first computing device; selecting second elements from the shared data set stored at the second computing device; generating a second rule set for extracting the selected second elements from the shared data set; and sending the second rule set to the first computing device; wherein the processor of the first computing device is further configured with processor-executable instructions to perform operations comprising; extracting the selected second elements from the shared data set stored at the first computing device using the second rule set; transforming the extracted second elements to generate a third result; sending the generated third result to the second computing device; determining whether the first result matches the second result; and determining whether the second computing device is authenticated based on whether the first result matches the second result; and wherein the processor of the second computing device is further configured with processor-executable instructions to perform operations comprising; transforming the selected second elements to generate a fourth result; determining whether the third result matches the fourth result; and determining whether the first computing device is authenticated based on whether the third result matches the fourth result. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for authenticating computing devices, comprising:
-
selecting, by a first processor of a first computing device, first elements from a shared data set stored at the first computing device, wherein the shared data set is also stored at a second computing device; generating, by the first processor, a first rule set for extracting the selected first elements from the shared data set; transforming, by the first processor, the selected first elements to generate a first result; sending, by the first processor, the first rule set to the second computing device; receiving, by a second processor of the second computing device, the first rule set from the first computing device; extracting, by the second processor, the selected first elements from the shared data set stored at the second computing device using the rule set; transforming, by the second processor, the extracted first elements to generate a second result; sending, by the second processor, the generated second result to the first computing device; selecting, by the second processor, second elements from the shared data set stored at the second computing device; generating, by the second processor, a second rule set for extracting the selected second elements from the shared data set; sending, by the second processor, the second rule set to the second computing device; extracting, by the first processor, the selected second elements from the shared data set stored at the first computing device using the second rule set; transforming, by the first processor, the extracted second elements to generate a third result; sending, by the first processor, the generated third result to the second computing device; determining, by the first processor, whether the first result matches the second result; determining, by the first processor, whether the second computing device is authenticated based on whether the first result matches the second result; transforming, by the second processor, the selected second elements to generate a fourth result; determining, by the second processor, whether the third result matches the fourth result; and determining, by the second processor, whether the first computing device is authenticated based on whether the third result matches the fourth result.
-
-
16. A non-transitory processor-readable storage medium having stored thereon processor-executable instructions configured to cause a processor of a computing device to perform operations for authenticating computing devices, comprising:
-
selecting, by a first processor of a first computing device, first elements from a shared data set stored at the first computing device, wherein the shared data set is also stored at a second computing device; generating, by the first processor, a first rule set for extracting the selected first elements from the shared data set; transforming, by the first processor, the selected first elements to generate a first result; and sending, by the first processor, the first rule set to the second computing device; receiving, by a second processor of the second computing device, the first rule set from the first computing device; extracting, by the second processor, the selected first elements from the shared data set stored at the second computing device using the rule set; transforming, by the second processor, the extracted first elements to generate a second result; sending, by the second processor, the generated second result to the first computing device; selecting, by the second processor, second elements from the shared data set stored at the second computing device; generating, by the second processor, a second rule set for extracting the selected second elements from the shared data set; sending, by the second processor, the second rule set to the second computing device; extracting, by the first processor, the selected second elements from the shared data set stored at the first computing device using the second rule set; transforming, by the first processor, the extracted second elements to generate a third result; sending, by the first processor, the generated third result to the second computing device; determining, by the first processor, whether the first result matches the second result; determining, by the first processor, whether the second computing device is authenticated based on whether the first result matches the second result; transforming, by the second processor, the selected second elements to generate a fourth result; determining, by the second processor, whether the third result matches the fourth result; and determining, by the second processor, whether the first computing device is authenticated based on whether the third result matches the fourth result.
-
Specification