×

Efficient methods for protecting identity in authenticated transmissions

  • US 10,129,020 B2
  • Filed: 03/13/2018
  • Issued: 11/13/2018
  • Est. Priority Date: 01/13/2014
  • Status: Active Grant
First Claim
Patent Images

1. An access device, comprising:

  • a processor; and

    a non-transitory computer-readable storage medium comprising code executable by the processor for implementing a method comprising;

    receiving, from a user device, a message including a blinded user device identifier and encrypted user device data;

    using the blinded user device identifier to identify a shared secret stored in association with the blinded user device identifier, the storing of the stored shared secret occurring before the receiving of the message;

    decrypting the encrypted user device data using the stored shared secret to obtain user device data;

    determining a user device public key from a user device certificate, the user device data including the user device certificate and a first cryptographic nonce;

    generating the blinded user device identifier based on the user device public key and the first cryptographic nonce;

    verifying that the blinded user device identifier generated based on the user device public key and the first cryptographic nonce is the same as the blinded user device identifier included in the message from the user device; and

    authenticating the user device based on the verifying of the blinded user device identifier.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×